Key Management for Role Hierarchy in Distributed Systems
As distributed computing system grow in size, complexity and variety of application, the problem of protecting sensitive data from unauthorized disclosure and tampering becomes increasingly important. In this paper, we present a cryptographic key management solution to the role-based access control (RBAC) model in distributed systems. The key management method used for distributed system is decentralized. Each local domain is managed by its local domain security manager and any key modifications of roles in a local domain will not affect the keys of roles in other local domains.
KeywordsHash Function Local Domain Public Parameter Access Control System Role Hierarchy
Unable to display preview. Download preview PDF.
- 1.Akl, S.G., Taylor, P.D.: Cryptographic Solution to a Multilevel Security Problem. In: Chaum, D., Rivest, R.L., Sherman, A.T. (eds.) Advanced in CryptologyGoogle Scholar
- 3.Barka, E., Sandhu, R.: A Role-Based Delegation Model and Some Extensions. In: Proc. of 23rd National Information Systems Security Conference (NISSC 2000) (December 2000)Google Scholar
- 4.Blaze, M.: A cryptographic file system for UNIX. In: ACM Conference on Computer and Communications Security, pp. 9–16 (1993)Google Scholar
- 5.Extensible Markup Language (XML), http://www.w3.org/XML/
- 7.Fu, K.: Group sharing and random access in cryptographic storage file systems. Master’s thesis, Massachusetts Institute of Technology (1999)Google Scholar
- 10.Parker, T., Pinkas, D.: SESAME V4 – Overview. SESAME systems documentation, https://www.cosic.esat.kuleuven.ac.be/sesame/
- 11.Sandhu, R., Coyne, E., Feinstein, H., Youman, C.: Role-Based Access Control Models. IEEE Computer 29(2) ( February 1996)Google Scholar