IP easy-pass: edge resource access control

Author(s):  
Haining Wang ◽  
A. Bose ◽  
M. El-Gendy ◽  
K.G. Shin
2002 ◽  
Vol 173 (1) ◽  
pp. 82-120 ◽  
Author(s):  
Matthew Hennessy ◽  
James Riely

2005 ◽  
Vol 13 (6) ◽  
pp. 1247-1260 ◽  
Author(s):  
Haining Wang ◽  
A. Bose ◽  
M. El-Gendy ◽  
K.G. Shin

2010 ◽  
Vol 26 (1) ◽  
pp. 21-28 ◽  
Author(s):  
Joan Arnedo-Moreno ◽  
Jordi Herrera-Joancomartí

2010 ◽  
Vol 18 (6) ◽  
pp. 971-998
Author(s):  
Frédéric Besson ◽  
Guillaume Dufay ◽  
Thomas Jensen ◽  
David Pichardie

2021 ◽  
Author(s):  
Qikun Zhang ◽  
Liang Zhu ◽  
Yimeng Wu ◽  
Jianyong Li ◽  
Yinghui Meng ◽  
...  

Abstract Access control technology is one of the key technologies to ensure safe resource sharing. Identity authentication and authority distribution are two key technologies for access control technology to restrict unauthorized users from accessing resources and resources can only be accessed by authorized legal users.However, user privacy protection and frequent permission changes are two thorny issues that need to be solved urgently by access control technology. To deal with these problems, this paper proposes a dynamic access control technology based on privacy protection. Compared with existing access control technologies, the main advantages of this paper are as follows: 1) encrypt and hide the attributes of entities, and use attribute-based identity authentication technology for identity authentication, which not only achieves the purpose of traditional identity authentication, but also ensures the attributes and privacy of entities are not leaked; 2) Binding resource access permissions with entity attributes, dynamically assigning and adjusting resource access control permissions through changes in entity attributes, making resource access control more fine-grained and more flexible. Security proof and performance analysis show that the proposed protocol safe under the hardness assumption of the discrete logarithm problem (DLP) and the decision bilinear Diffie-Hellman (DBDH) problem. Compared with the cited references, it has the advantages of low computational complexity, short computational time, and low communication overhead.


2011 ◽  
Vol 5 (2/3) ◽  
pp. 273 ◽  
Author(s):  
Chunquan Li ◽  
Yuling Shang ◽  
Chunyang Hu ◽  
Xiaole Kuang ◽  
Panfeng Zhu

Sign in / Sign up

Export Citation Format

Share Document