Key management for role hierarchy in distributed systems

0Citations
Citations of this article
18Readers
Mendeley users who have this article in their library.
Get full text

Abstract

As distributed computing system grow in size, complexity and variety of application, the problem of protecting sensitive data from unauthorized disclosure and tampering becomes increasingly important. In this paper, we present a cryptographic key management solution to the role-based access control (RBAC) model in distributed systems. The key management method used for distributed system is decentralized. Each local domain is managed by its local domain security manager and any key modifications of roles in a local domain will not affect the keys of roles in other local domains. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Li, C., Yang, C., & Cheung, R. (2005). Key management for role hierarchy in distributed systems. In Lecture Notes in Computer Science (Vol. 3574, pp. 293–302). Springer Verlag. https://doi.org/10.1007/11506157_25

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free