Schematized access control for data cubes and trees

12Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In classic ICN where delivery of named data cannot be guarded, access control is usually implemented by first encrypting the data and secondly by providing the corresponding data encryption keys (DEKs) to authorized users only: Authorized users will obtain DEKs in encrypted form, wrapped with their public key. This approach has three shortcomings which we address in this paper. (a) Key management is tedious if it has to be done on a per-principle basis, (b) access granularity for single documents should be extended to document collections (e.g. namespace sub-trees) and data cubes (sub-elements within data records), (c) there needs to be support for access right propagation across data aggregation and derivation chains.

Cite

CITATION STYLE

APA

Marxer, C., & Tschudin, C. (2017). Schematized access control for data cubes and trees. In ICN 2017 - Proceedings of the 4th ACM Conference on Information Centric Networking (pp. 170–175). Association for Computing Machinery, Inc. https://doi.org/10.1145/3125719.3125736

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free