A key distribution method for object-based protection
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
Proactive public key and signature systems
Proceedings of the 4th ACM conference on Computer and communications security
A model of OASIS role-based access control and its support for active security
ACM Transactions on Information and System Security (TISSEC)
Concealing complex policies with hidden credentials
Proceedings of the 11th ACM conference on Computer and communications security
Verification and change-impact analysis of access-control policies
Proceedings of the 27th international conference on Software engineering
Policy-hiding access control in open environment
Proceedings of the twenty-fourth annual ACM symposium on Principles of distributed computing
Layering Public Key Distribution Over Secure DNS using Authenticated Delegation
ACSAC '05 Proceedings of the 21st Annual Computer Security Applications Conference
Eastern Interconnection Phasor Project
HICSS '06 Proceedings of the 39th Annual Hawaii International Conference on System Sciences
Attribute-Based Access Control with Hidden Policies and Hidden Credentials
IEEE Transactions on Computers
Escrow-free encryption supporting cryptographic workflow
International Journal of Information Security
Attribute-based encryption for fine-grained access control of encrypted data
Proceedings of the 13th ACM conference on Computer and communications security
Domain-based administration of identity-based cryptosystems for secure email and IPSEC
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
EIPP Data Management Task Team Architecture
HICSS '07 Proceedings of the 40th Annual Hawaii International Conference on System Sciences
Ciphertext-Policy Attribute-Based Encryption
SP '07 Proceedings of the 2007 IEEE Symposium on Security and Privacy
Secure Event Dissemination in Publish-Subscribe Networks
ICDCS '07 Proceedings of the 27th International Conference on Distributed Computing Systems
Provably secure ciphertext policy ABE
Proceedings of the 14th ACM conference on Computer and communications security
North American SynchroPhasor Initiative
HICSS '08 Proceedings of the Proceedings of the 41st Annual Hawaii International Conference on System Sciences
Tag-KEM/DEM: A New Framework for Hybrid Encryption
Journal of Cryptology
Securing publish/subscribe for multi-domain systems
Proceedings of the ACM/IFIP/USENIX 2005 International Conference on Middleware
Simple identity-based cryptography with mediated RSA
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
Attribute-based encryption with partially hidden encryptor-specified access structures
ACNS'08 Proceedings of the 6th international conference on Applied cryptography and network security
Collusion-Free policy-based encryption
ISC'06 Proceedings of the 9th international conference on Information Security
Policy-based cryptography and applications
FC'05 Proceedings of the 9th international conference on Financial Cryptography and Data Security
Reducing the dependence of SPKI/SDSI on PKI
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
Key derivation algorithms for monotone access structures in cryptographic file systems
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
Attribute-Based Messaging: Access Control and Confidentiality
ACM Transactions on Information and System Security (TISSEC)
Dependable and secure computing in medical information systems
Computer Communications
Survey Cyber security in the Smart Grid: Survey and challenges
Computer Networks: The International Journal of Computer and Telecommunications Networking
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
Hi-index | 0.00 |
In distributed systems users need the ability to share sensitive content with multiple other recipients based on their ability to satisfy arbitrary policies. One such system is electricity grids where finegrained sensor data sharing holds the potential for increased reliability and efficiency. However, effective data sharing requires technical solutions that support flexible access policies, for example, sharing more data when the grid is unstable. In such systems, both the messages and policies are sensitive and, therefore, they need to kept be secret. Furthermore, to allow for such a system to be secure and usable in the presence of untrusted object stores and relays it must be resilient in the presence of active adversaries and provide efficient key management. While several of these properties have been studied in the past we address a new problem in the area of policy based encryption in that we develop a solution with all of these capabilities. We develop a Policy and Key Encapsulation Mechanism -- Data Encapsulation Mechanism (PKEM-DEM) encryption scheme that is a generic construction secure against adaptive chosen ciphertext attacks and develop a Policy Based Encryption System (PBES) using this scheme that provides these capabilities. We provide an implementation of PBES and measure its performance.