Improved Security Notions for Proxy Re-Encryption to Enforce Access Control.
Ela LeePublished in: IACR Cryptol. ePrint Arch. (2017)
Keyphrases
- access control
- security model
- proxy re encryption
- security policies
- security requirements
- data security
- public key encryption
- security mechanisms
- dynamic access control
- security architecture
- security analysis
- role based access control
- access control models
- identity management
- access control policies
- public key
- standard model
- database security
- unauthorized access
- access control mechanism
- rbac model
- access control systems
- data management
- role assignment
- structured data