Authorization-Limited Transformation-Free Proxy Cryptosystems and Their Security Analyses.
Lihua WangZhenfu CaoTakeshi OkamotoYing MiaoEiji OkamotoPublished in: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. (2006)
Keyphrases
- access control
- security policies
- security requirements
- elliptic curve
- fuzzy vault
- role based access control
- cryptographic protocols
- image scrambling
- private key
- access requests
- security issues
- role assignment
- smart card
- intrusion detection
- access control models
- ring signature scheme
- security properties
- trust management
- data security
- security analysis
- statistical databases
- security model
- access control systems
- security mechanisms
- secret key
- network security
- high security
- rbac model
- access control policies