Design of a lattice-based access control scheme

  • Authors:
  • Chia-Chu Chiang;Coskun Bayrak;Remzi Seker;Umit Topaloglu;Murat Demirer;Nasrola Samadi;Suleyman Tek;Bian Jiang;GuangXu Zhou;Xiaoran Wang

  • Affiliations:
  • Department of Computer Science, University of Arkansas at Little Rock, Little Rock, Arkansas;Department of Computer Science, University of Arkansas at Little Rock, Little Rock, Arkansas;Department of Computer Science, University of Arkansas at Little Rock, Little Rock, Arkansas;UAMS;Department of Computer Science, University of Arkansas at Little Rock, Little Rock, Arkansas and Computer Science Department, Faculty of Science and Letters Kultur Universitesi, Istanbul, Turkey;Department of Computer Science, University of Arkansas at Little Rock, Little Rock, Arkansas;Department of Computer Science, University of Arkansas at Little Rock, Little Rock, Arkansas;Department of Computer Science, University of Arkansas at Little Rock, Little Rock, Arkansas;Department of Computer Science, University of Arkansas at Little Rock, Little Rock, Arkansas;Department of Computer Science, University of Arkansas at Little Rock, Little Rock, Arkansas

  • Venue:
  • SMC'09 Proceedings of the 2009 IEEE international conference on Systems, Man and Cybernetics
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

We survey the literature for access control schemes in a user hierarchy. Some schemes have already been shown to be insecure or incorrect. Many schemes assume very restrictive subordinating relationships existing in a hierarchy where users are grouped into partially ordered relationships without taking resources into consideration. We believe that a practical access control scheme should support access control in a lattice where users and resources are both together grouped into partially ordered relationships. In this paper, we present a scheme to achieve this goal. We also study existing schemes for their efficiency and performance. Based on the results of the study, we design an efficient scheme to support dynamic key management.