• Home
  • About
  • Policies
  • Contact
    • Türkçe
    • English
  • English 
    • Türkçe
    • English
  • Login
Advanced Search
View Item 
  •   Home
  • Fen Edebiyat Fakültesi / Faculty of Letters and Sciences
  • Matematik - Bilgisayar / Mathematics and Computer Science
  • Makaleler / Articles
  • View Item
  •   Home
  • Fen Edebiyat Fakültesi / Faculty of Letters and Sciences
  • Matematik - Bilgisayar / Mathematics and Computer Science
  • Makaleler / Articles
  • View Item
JavaScript is disabled for your browser. Some features of this site may not work without it.

Enable delegation for RBAC with secure authorization certificate

Thumbnail
Author
Zhou, GuangXu
Demirer, Murat
Bayrak, Coşkun
Wang, Licheng
Type
Article
Date
2011-11
Language
en_US
Metadata
Show full item record
Abstract
Our motivation in this paper is to explore a Secure Delegation Scheme that could keep access control information hidden through network transmission. This approach introduces the quasirandom structure, 3-Uniform Hypergraph, as the representation structure for authorization information. It generates a Secure Authorization Certificate (SAC) in place of an Attribute Certificate (AC) to enable both Role-based Access Control (RBAC) and a delegation process for hiding authorization information. We have two contributions in this regard: (1) a value-based delegation scheme and (2) a pattern-based RBAC. A Secure Delegation Scheme is based on the hashing values generated with the quasirandom structure. With this scheme, the delegation process will greatly reduce the risk of sensitive authorization information leakage for applications. In the case of pattern-based access, we introduce a new hash function using quasirandom structure to make a fingerprint(1) for RBAC. The quasirandom structure derived from k-Uniform Hypergraph has measurable uniformity, which is an advantage over traditional hash functions. Another advantage is that it does not need to access the entire message context to generate the fingerprint which is essential for traditional hash functions such as MD5, SHA-1, etc. (C) 2011 Elsevier Ltd. All rights reserved.
Subject
Access Control
Computer Network Security
Random Number Generator
Secure Authorization
Secure Delegation
Quasirandom Structures
K-uniform Hypergraph
Regularity
Trust
Giriş Kontrolu
Bilgisayar Ağ Güvenliği
Rasgele Sayı Üreteci
Güvenli Yetkilendirme
Güvenli Heyeti
Quasirandom Yapıları
K Düzgün Hypergraph
Düzenlilik
Güven
URI
http://hdl.handle.net/11413/1370
Collections
  • Makaleler / Articles [209]
  • Scopus Publications [724]
  • WoS Publications [1016]

İstanbul Kültür University

Hakkında |Politika | Kütüphane | İletişim | Send Feedback | Admin

Istanbul Kültür University, Ataköy Campus E5 Karayolu Üzeri Bakırköy 34158, İstanbul / TURKEY
Copyright © İstanbul Kültür University

Creative Commons Lisansı
IKU Institutional Repository, Creative Commons Alıntı-GayriTicari-Türetilemez 4.0 Uluslararası Lisansı ile lisanslanmıştır.

Designed by  UNIREPOS

İKU Kütüphane


Browse

All of DSpaceCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsTypeLanguageBy PublisherRightsPubmedScopusWoSThis CollectionBy Issue DateAuthorsTitlesSubjectsTypeLanguageBy PublisherRightsPubmedScopusWoS

My Account

Login

İstanbul Kültür University

Hakkında |Politika | Kütüphane | İletişim | Send Feedback | Admin

Istanbul Kültür University, Ataköy Campus E5 Karayolu Üzeri Bakırköy 34158, İstanbul / TURKEY
Copyright © İstanbul Kültür University

Creative Commons Lisansı
IKU Institutional Repository, Creative Commons Alıntı-GayriTicari-Türetilemez 4.0 Uluslararası Lisansı ile lisanslanmıştır.

Designed by  UNIREPOS