Role-Based Signature and Its Security Proof.
Fucai LuoChanglu LinYan ZhuPublished in: J. Inf. Sci. Eng. (2016)
Keyphrases
- access control
- digital copyright protection
- security policies
- security requirements
- information security
- access control systems
- role based access control
- blind signature scheme
- blind signature
- trust negotiation
- signature verification
- intrusion detection
- role assignment
- signature scheme
- signature recognition
- security systems
- data security
- security problems
- key management
- theorem proving
- security model
- cloud computing
- security protocols
- security properties
- data integrity
- computer security
- functional requirements
- theorem prover
- distributed environment
- public key cryptosystem
- information systems