Abstract
A scheme based on cryptography is proposed for enforcing multilevel security in a system where hierarchy is represented by a partially ordered set (or poset). Straightforward implementation of the scheme requires users highly placed in the hierarchy to store a large number of cryptographic keys. A time-versus-storage trade-off is then described for addressing this key management problem.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
G. H. MacEwen, Secure information flow in distributed systems, Proceedings of the Eleventh Biennial Symposium on Communications, Queen’s University, Kingston, Ontario (1982).
D. E. R. Denning, “Cryptography And Data Security”, Addison-Wesley, Reading, Massachusetts (1982).
A. G. Konheim, “Cryptography: A Primer”, John Wiley & Sons, Toronto (1981).
C. Meyer and S. M. Matyas, “Cryptography - A New Dimension In Computer Security”, John Wiley & Sons, New York (1982).
G. J. Simmons, Symmetric and asymmetric encryption, Comput. Surv. 11: 305 (1977).
Data Encryption Standard, Federal Information Processing Standard (FIPS), Publication 46, National Bureau of Standards, U.S. Department of Commerce (1977).
R. L. Rivest, A. Shamir and L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Commun. ACM 21: 120 (1978).
M. O. Rabin, Digitalized signatures and public-key functions as intractable as factorization, Technical Report MIT/LCS/TR-212, Laboratory for Computer Science, Massachusetts Institute of Technology, Cambridge, Massachusetts (1979).
H. C. Williams, A modification of the RSA public-key encryption procedure, IEEE Trans. Inform. Theory IT26: 726 (1980).
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1983 Springer Science+Business Media New York
About this paper
Cite this paper
Akl, S.G., Taylor, P.D. (1983). Cryptographic Solution to a Multilevel Security Problem. In: Chaum, D., Rivest, R.L., Sherman, A.T. (eds) Advances in Cryptology. Springer, Boston, MA. https://doi.org/10.1007/978-1-4757-0602-4_23
Download citation
DOI: https://doi.org/10.1007/978-1-4757-0602-4_23
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4757-0604-8
Online ISBN: 978-1-4757-0602-4
eBook Packages: Springer Book Archive