首页> 外文会议>ACM Conference on Computer and communications security >A key distribution method for object-based protection
【24h】

A key distribution method for object-based protection

机译:基于对象的保护的密钥分发方法

获取原文

摘要

, that is protection of an object, such as a file or a message, regardless of where the object is currently being stored or transferred within a distributed environment. An example of object-based protection is traditional electronic mail encryption, where access control amounts to selecting a list of individuals permitted to decrypt a message and attaching copies of the symmetric encryption key, encrypted using their public keys, to the encrypted message content. We present a different means of controlling access to decryption keys which can support more flexible access control rules and can better reflect security policy. It is particularly suitable for use in such data distribution environments as public file servers, bulletin boards, commercial information dissemination services, and groupware applications. Because all participants need to trust central servers, the method is less suitable for loosely-connected groups than for medium to large commercial or government organizations.
机译:,即对对象(例如文件或消息)的保护,而不管对象当前在分布式环境中存储或传输的位置。基于对象的保护的一个示例是传统的电子邮件加密,其中访问控制相当于选择一个被允许解密消息的个人列表,并将使用其公钥加密的对称加密密钥的副本附加到加密的消息内容中。我们提出了一种控制对解密密钥的访问的不同方法,该方法可以支持更灵活的访问控制规则,并且可以更好地反映安全策略。它特别适合在诸如公共文件服务器,公告板,商业信息发布服务和群件应用程序之类的数据分发环境中使用。因为所有参与者都需要信任中央服务器,所以该方法不太适合于松散连接的组,而不适合中大型商业或政府组织。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号