As distributed computing system grow in size, complexity and variety of application, the problem of protecting sensitive data from unauthorized disclosure and tampering becomes increasingly important. In this paper, we present a cryptographic key management solution to the role-based access control (RBAC) model in distributed systems. The key management method used for distributed system is decentralized. Each local domain is managed by its local domain security manager and any key modifications of roles in a local domain will not affect the keys of roles in other local domains. © Springer-Verlag Berlin Heidelberg 2005.
CITATION STYLE
Li, C., Yang, C., & Cheung, R. (2005). Key management for role hierarchy in distributed systems. In Lecture Notes in Computer Science (Vol. 3574, pp. 293–302). Springer Verlag. https://doi.org/10.1007/11506157_25
Mendeley helps you to discover research relevant for your work.