Comprehensive evaluation of key management hierarchies for outsourced data
Abstract Key management is an essential component of a cryptographic access control system with a large number of resources. It manages the secret keys assigned to the system entities in such a way that only authorized users can access a resource. Read access control allows read access of a resource...
Main Authors: | Naveen Kumar, Anish Mathuria |
---|---|
Format: | Article |
Language: | English |
Published: |
SpringerOpen
2019-02-01
|
Series: | Cybersecurity |
Subjects: | |
Online Access: | http://link.springer.com/article/10.1186/s42400-019-0026-y |
Similar Items
-
Secure data outsourcing in presence of the inference problem: issues and directions
by: Adel Jebali, et al.
Published: (2021-01-01) -
Secure IoT Data Outsourcing With Aggregate Statistics and Fine-Grained Access Control
by: Ling Liu, et al.
Published: (2020-01-01) -
Identification and Prioritization Risks of Health Information Technology Services Outsourcing: A Fuzzy Analytical Hierarchy Process
by: Rita Rezaee, et al.
Published: (2017-10-01) -
Symmetric Key Management for Mobile Financial Applications : A Key Hierarchy Approach
by: Azam, Junaid
Published: (2013) -
An Efficient ABE Scheme With Verifiable Outsourced Encryption and Decryption
by: Zhidan Li, et al.
Published: (2019-01-01)