Filters








951,499 Hits in 7.1 sec

Secure attribute-based systems

Matthew Pirretti, Patrick Traynor, Patrick McDaniel, Brent Waters
2010 Journal of Computer Security  
In this paper, we introduce a novel secure information management architecture based on emerging attribute-based encryption (ABE) primitives.  ...  Through this, we demonstrate that our attribute system is an efficient solution for securely managing information in large, loosely-coupled, distributed systems.  ...  In this paper, we develop and evaluate a secure attribute system built on attribute-based encryption (ABE).  ... 
doi:10.3233/jcs-2009-0383 fatcat:wi3pfr4ylvbdrjwuh4p22padyy

Secure attribute-based systems

Matthew Pirretti, Patrick Traynor, Patrick McDaniel, Brent Waters
2006 Proceedings of the 13th ACM conference on Computer and communications security - CCS '06  
In this paper, we introduce a novel secure information management architecture based on emerging attribute-based encryption (ABE) primitives.  ...  Through this, we demonstrate that our attribute system is an efficient solution for securely managing information in large, loosely-coupled, distributed systems.  ...  In this paper, we develop and evaluate a secure attribute system built on attribute-based encryption (ABE).  ... 
doi:10.1145/1180405.1180419 dblp:conf/ccs/PirrettiTMW06 fatcat:umsheeumdzds3jkony4b2fvr5e

Secure Messenger System using Attribute Based Encryption

Yeon Tae Kim, Hyoseung Kim, Hyo Jin Jo, Dong Hoon Lee
2015 Journal of Security Engineering  
The proposed protocol is available for a secure key synchronization between heterogeneous devices by using the Attribute-Based Encryption scheme.  ...  However, many security problems such as leakage of personal information constantly come up although they provide conveniences.  ...  관련연구 및 배경지식 2.1 관련연구 2.1.1 메신저관련 연구 기능 속성기반암호화(Attribute Based Encryption)관련 연구 속성기반암호화는 Sahai와 Waters에 의해 처음 제안되었다[5].  ... 
doi:10.14257/jse.2015.10.05 fatcat:tguskkle6vb2paagjdhcwleawi

Secure Data Retrieval Of Attribute Based Encryption Policy System

Mahaling G. Salimath
2016 International Journal Of Engineering And Computer Science  
Consequently the scalability and security can be enhanced in the proposed system.  ...  Applying ABE to DTN presents a few issues like Key revocation (or upgrade), Key escrow issue and Coordination of attributes issued from distinctive authorities.  ...  Related Work Attribute Based Encryption Attribute based encryption was at first proposed by Amit Sahai et al. also, Brent Waters et al.  ... 
doi:10.18535/ijecs/v5i11.26 fatcat:nfo3tz434zgenefbykmzillkly

Secure Zones: An Attribute-Based Encryption advisory system for safe firearms

Marcos Portnoi, Chien-Chung Shen
2013 2013 IEEE Conference on Communications and Network Security (CNS)  
The Secure Zones utilize Attribute-Based Encryption to encode the policies and user attributes, and providing privacy and security through it cryptography.  ...  This work presents an application of the highly expressive Attribute-Based Encryption to implement Secure Zones for firearms.  ...  Secure Zone Authority Encrypted Transmission: decides on a Secure Zone policy over the attribute set .  ... 
doi:10.1109/cns.2013.6682746 dblp:conf/cns/PortnoiS13 fatcat:kmkfdvg3c5gjziwfk42oljgaou

Practical Decentralized Attribute-Based Delegation Using Secure Name Systems

Martin Schanzenbach, Christian Banse, Julian Schutte
2018 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)  
While current proposals often fail at the practicability, we show how attribute-based delegation can be realized on top of the secure GNU Name System (GNS) to solve an authorization problem in a real-world  ...  One approach to decentralizing trust is distributed, attribute-based access control via attribute-based delegation (ABD).  ...  DESIGN In this section, we present our design of a decentralized, attribute-based delegation system on top of a secure name system.  ... 
doi:10.1109/trustcom/bigdatase.2018.00046 dblp:conf/trustcom/SchanzenbachBS18 fatcat:yobcsvesmvgf7kilzhkqpcaugq

A Rivest Shamir Adleman Approach to Attribute Based Security System

L.A. Nwosu, B.K. Alese, A.F. Thompson, O.O. Obe
2015 International Journal of Intelligent Computing Research  
Traditional attribute architectures and cryptosystems are ill-equipped to provide security in the face of diverse access requirements and environments.  ...  The developed system overcomes the shortcomings of other schemes in the standard model.  ...  Consequently, there is a great need to meet this security and authentication requirements using attribute-based signature system.  ... 
doi:10.20533/ijicr.2042.4655.2015.0072 fatcat:s6xpkqgxobdibmkgp5a3wlb65i

Secure Attribute-Based Access Control with a Ciphertext-Policy Attribute-Based Encryption Scheme

Rifki Sadikin, Young Ho Park, Kil Houm Park
2014 Journal of the Korea Industrial Information Systems Research  
We propose a secure access control based on a fully secure and fine grained ciphertext-policy attribute-based encryption scheme.  ...  The term of "attribute" has broader meaning than "role" in role-based access control. Attributes defines the property of a user or a resource.  ...  Waters, "Secure attribute-based systems.", Proceedings of the 13th ACM conference on Computer and communications security, pp. 99-112, 2006. [20] C.  ... 
doi:10.9723/jksiis.2014.19.1.001 fatcat:f6mjbxsagve2xlwbnevg3nczoe

A Framework for Security Metrics Based on Operational System Attributes

E. Jonsson, L. Pirzadeh
2011 2011 Third International Workshop on Security Measurements and Metrics  
Thus, we suggest a framework for security metrics that is based on a number of system attributes taken from the security and the dependability disciplines.  ...  We suggest that there should be metrics related to protective attributes, to behavioural attributes and possibly to system correctness.  ...  Based on the model we regroup the traditional security and dependability attributes into protective attributes, behavioural attributes and correctness and we suggest a framework for how to define metrics  ... 
doi:10.1109/metrisec.2011.19 dblp:conf/esem/JonssonP11 fatcat:4nqxnij3t5dcfmnckks6zjdj2a

An IoT Attribute-Based Security Framework for Topic-based Publish/Subscribe Systems

Olivier Blazy, Emmanuel Conchon, Mathieu Klingler, Damien Sauveron
2021 IEEE Access  
In this paper, we present a complete security framework for topic-based publish/subscribe systems to ensure both security and privacy at the broker level, going beyond the naive encryption of information  ...  INDEX TERMS Secure publish/subscribe, attribute-based cryptography, publications/subscriptions confidentiality, user revocation.  ...  From a security perspective, this paper fills existing gaps by proposing an IoT attribute-based security framework for topic-based pub/sub systems.  ... 
doi:10.1109/access.2021.3051469 fatcat:ngi3ldk47vaandhzeyzuy4ndue

Verifiable Attribute-based Keyword Search Encryption with Attribute Revocation for Electronic Health Record System

Zhenhua Liu, Yan Liu, Jing Xu, Baocang Wang
2020 International Journal of Network Security  
Considering the security requirements of electronic health record (EHR) system, we propose a ciphertextpolicy attribute-based encryption scheme, which can support data retrieval, result verification and  ...  In the proposed scheme, we make use of the BLS signature technique to achieve result verification for attribute-based keyword search encryption.  ...  Since then, some attribute-based encryption schemes [5, 8] for EHR system have been presented.  ... 
dblp:journals/ijnsec/LiuLXW20 fatcat:kl3mhtl7kjdvxf3dd52rdeypba

Short CCA-Secure Attribute-Based Encryption

Hiroaki Anada, Seiko Arita
2018 Advances in Science, Technology and Engineering Systems  
We show direct chosen-ciphertext security modification in the case of attribute-based encryption (ABE), where an ABE scheme secure against chosen-plaintext attacks (CPA) is converted into an ABE scheme  ...  secure against CCA by individual techniques.  ...  attribute-based KEM here.www.astesj.com www.astesj.com  ... 
doi:10.25046/aj030132 fatcat:glq6lvmpdvcidou2sxw6qaxy4q

Attribute Set Based Signature Secure in the Standard Model

2015 KSII Transactions on Internet and Information Systems  
We introduce attribute set based signature (ASBS), a new cryptographic primitive which organizes user attributes into a recursive set based structure such that dynamic constraints can be imposed on how  ...  Compared with attribute based signature (ABS), ASBS is more flexible and efficient in managing user attributes and specifying signing policies.  ...  However, as observed by Bobba, Khurana and Prabhakaran [2] , attribute based systems are far from being flexible in managing user attributes and specifying signing policies, mainly due to the fact that  ... 
doi:10.3837/tiis.2015.04.014 fatcat:pos7clrybbcc3all32hojj3sta

Highly Secure Method based on Ciphertext Policy Attribute based Encryption in Hadoop System

Priyanka Rajput, Pankaj Kwadakar
2014 International Journal of Computer Applications  
In this paper, we use the Hadoop based file system and secure it using a highly secure algorithm based on ciphertext policy attributes based encryption with pairing (CP-ABE-WP with pairing).  ...  This paper examines security for "big data" environments, reviewing built-in protections and weaknesses of these systems.  ...  On the basis of these we can prove that proposed system give more efficient output with security in Hadoop system.  ... 
doi:10.5120/18105-9204 fatcat:ixuompvfxfayvhfpwrlyzjzdi4

Secure Login System using MD5 and AES Attribute Based Encryption Algorithm

2020 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
So basically, this work is based on providing security to the systems.  ...  Secure secret word stockpiling is a crucial perspective in framework dependent on secret word verification, which is as yet the most broadly utilized confirmation system, notwithstanding its some security  ...  We thank Priya Pise for her assistance with Secure Login System Using MD5 and AES Attribute Based Encryption Algorithm that significantly progressed the manuscript.  ... 
doi:10.35940/ijitee.h6509.069820 fatcat:rpnxv7bppzchrehxrntxxcwqxi
« Previous Showing results 1 — 15 out of 951,499 results