- Shopping Bag ( 0 items )
Other sellers (Hardcover)
-
All (6) from $62.12
-
New (4) from $90.2
-
Used (2) from $62.12
More About This Textbook
Overview
Cryptographic access control (CAC) is an approach to securing data by encrypting it with a key, so that only the users in possession of the correct key are able to decrypt the data and/or perform further encryptions. Applications of cryptographic access control will benefit companies, governments and the military where structured access to information is essential.
The purpose of this book is to highlight the need for adaptability in cryptographic access control schemes that are geared for dynamic environments, such as the Internet. Adaptive Cryptographic Access Control presents the challenges of designing hierarchical cryptographic key management algorithms to implement Adaptive Access Control in dynamic environments and suggest solutions that will overcome these challenges.
Adaptive Cryptographic Access Control is a cutting-edge book focusing specifically on this topic in relation to security and cryptographic access control. Both the theoretical and practical aspects and approaches of cryptographic access control are introduced in this book. Case studies and examples are provided throughout this book.
This book is designed for a professional audience composed of researchers, technicians and government/military employees working in the Information Security industry. Advanced-level students concentrating on computer science for Information Security and Cryptography will also find this book useful as a reference or secondary text book.
Editorial Reviews
From the Publisher
From the reviews:“This monograph gives an overview of cryptographic access control with an emphasis on key management. The authors compare different techniques described in the literature. … The book does not only give a valuable overview of the current methods. The authors also give detailed practical analysis of the key management functions such as key assignment and replacement as well as re-keying in the different approaches.” (Ulrich Tipp, Zentralblatt MATH, Vol. 1202, 2011)
“Data encryption—the main technique used to control access to data—is the subject of this book. … the intended audience comprises students, researchers, and teachers. … The authors proceed by presenting an algorithm and an experimental measurement of its performance. … The book has an extensive bibliography—151 entries—and a minimal index.” (J. W. Snively, ACM Computing Reviews, February, 2012)
Product Details
Table of Contents
1 Introduction 1
1.1 Motivation 1
1.2 What is Autonomic Computing? 2
1.3 From Manually Managed to Adaptive Access Control 3
1.4 Aim of this Monograph 5
1.5 How to read this Monograph 8
2 A Presentation of Access Control Methods 11
2.1 Distributed Access Control's Beginnings 11
2.2 Terminology 12
2.3 General Access Control Models 13
2.3.1 Discretionary Access Control 13
2.3.2 Mandatory Access Control 15
2.3.3 Role-Based Access Control 16
2.3.4 Multilevel Access Control 18
2.4 Cryptographic Access Control 19
2.4.1 Key Management Models 20
2.4.2 One-Way Function Schemes 21
2.4.3 Time-Bound Schemes 28
2.4.4 Other CKM Schemes 29
2.5 Other Access Control Paradigms 30
2.5.1 Overview 30
2.5.2 Cokies 31
2.5.3 XML Access Control and Limitations 32
2.5.4 Anti-Viruses, Intrusion Detection, and Firewalls 34
2.6 Controlling Access to Outsourced Data 36
2.7 Autonomic Access Control 37
2.7.1 The Autonomic Security Model 38
2.7.2 Perspectives and Discussions 39
3 Efficient Key Management: Heuristics 41
3.1 Overview 41
3.2 An Overview of the CAT Scheme 42
3.3 Exponent Assignment Algorithm 43
3.3.1 Algorithm 45
3.3.2 Exponent Assignment Example 46
3.4 Enforcing Hierarchy Updates 48
3.4.1 Replacement, Insertion, and Delection: Algorithm 48
3.4.2 Insertion, Deletion and Replacement: Example 50
3.5 Analysis 52
3.5.1 Security Analysis 52
3.5.2 Complexity Analysis 53
3.6 Experimental Setup and Results 53
3.6.1 Implementation and Experimental setup 54
3.6.2 Cost of Key Generation 55
3.6.3 Cost of Data Encryption 56
3.6.4 Cost of Key Replacement 57
3.6.5 Window of Vulnerability 57
3.7 Discussions 58
4 Timestamped Key Management 61
4.1 On Timestamps and Key Updates 61
4.2 Timestamped Key Assignment 63
4.3 Timestamped Rekey Scheme-Algorithm 65
4.4 Analysis 66
4.4.1 Security Analysis 66
4.4.2 Complexity Analysis 66
4.5 Experimental Setup and Results 67
4.5.1 Implemetation and Experimental Setup 67
4.5.2 Timestamped Key Generation-Server Cost 69
4.5.3 Timestamped Rekeying - Server Cost 70
4.5.4 Window of Vulnerability 71
4.6 Discussion 72
5 Controlling Access to Outsourced Data 75
5.1 75
5.1.1 Securig Outsourced Data 76
5.1.2 Combining CKM and RBAC 78
5.1.3 Handling Key Updates 80
5.2 Discussion 82
6 Self-Protection Key Management 85
6.1 Overview 85
6.2 Self-Protection Cryptographic Key Management (SPCKM) Framework 86
6.2.1 Mathematical Model Supporting Framework 88
6.2.2 An Example 92
6.3 Implementation and Experimetal Setup 93
6.3.1 Experimental Setup 93
6.3.2 Prototype Description 94
6.3.3 Performance Criteria 95
6.3.4 Experimental Results 96
6.4 Discussions 99
6.4.1 Contributions of the SPCKM Framework 99
6.4.2 Some Challenges in Adaptive Rekeving 101
6.4.3 The Adaptive Rekey Scheduling Problem 102
7 Collusion Detection and Resolution 105
7.1 Overview 105
7.2 On Detecting Collusion Possibilites 106
7.2.1 The DCFK problem 107
7.3 An Adaptive Framework for Collusion Detection and Resolution (ACDR) 108
7.3.1 Some Basic Assumptions 109
7.3.2 Collusion Verification 111
7.3.3 Example of Collusion Detection 112
7.3.4 Collusion Resolution Algorithm 113
7.3.5 Example of Collusion Resolution 114
7.4 Experimental Setup and Results 116
7.4.1 Implementation and Experimental Setup 116
7.4.2 Cost of Collusion Detection 116
7.4.3 Cost of Collusion Resolution 117
7.4.4 Cost of Key Generation 118
7.4.5 Cost of Key Generation and Data Encryption 119
7.5 Discussions 119
8 Conclusions 121
8.1 Synopsis 121
8.2 Critique 122
8.3 Potential Extensions 125
8.3.1 Internal Violations 125
8.3.2 Adaptive Rekeying 126
8.3.3 Key Selection 127
References 129
Index 137