Application of Quaternion Numbers in Identification Scheme

2015 ◽  
Vol 3 (2) ◽  
Author(s):  
Reza Alimoradi

The goal of an identification procedure is access control. Methods that permit an identification are called identification protocols. In this paper, first we introduced quaternion numbers. In addition we proposed a new identification scheme based on quaternions. Finally, the security of our scheme is analyzed.

2009 ◽  
Vol 29 (7) ◽  
pp. 2000-2002
Author(s):  
Qin CHEN ◽  
Huan YUAN ◽  
Jian-hua FENG

2017 ◽  
Vol 7 (1.1) ◽  
pp. 322
Author(s):  
K. V. V. Satyanarayana ◽  
J. Mahathi ◽  
V. V. R. Srikar ◽  
S.K. Sai Babu

Now-a-days, usage of cloud is getting more popular and for the safety the security is being enhanced every day from time to time. Multiple security techniques are being implemented.Attribute based security is one of the concepts especially for basics of the cipher-text based, but the user's attributes were given by the multiple authorities. So, the multi-authority with cipher-text encryption is emerging at present. In this, we will see why the cipher-text based is important and different security models with the multi-authority with the revocation in the different levels in the security models.


Author(s):  
Abdus Sattar Chaudry ◽  
Zhihong Wang

Features of current electronic journals systems have been reviewed and practices of handling e-journals on serials control work. While most of the delivery and access systems are similar in browsing and searching facilities, there are variations in pricing policies, archiving, licensing, and access control methods that create problems for information institutions.


1988 ◽  
Vol 7 (5) ◽  
pp. 524
Author(s):  
David A. Reisinger

2015 ◽  
Vol 25 (09n10) ◽  
pp. 1551-1571
Author(s):  
Dianxiang Xu ◽  
Ning Shen ◽  
Yunpeng Zhang

With the increasing complexity of software, new access control methods have emerged to deal with attribute-based authorization. As a standard language for specifying attribute-based access control policies, XACML offers a number of rule and policy combining algorithms to meet different needs of policy composition. Due to their variety and complexity, however, it is not uncommon to apply combining algorithms incorrectly, which can lead to unauthorized access or denial of service. To solve this problem, this paper presents a fault-based testing approach for revealing incorrect combining algorithms in XACML 3.0 policies. The theoretical foundation of this approach relies on the formalization of semantic differences between rule combining algorithms and between policy combining algorithms. It allows the use of a constraint solver for generating queries to which a given policy produces different responses than its combining algorithm-based mutants. Such queries can determine whether or not the given combining algorithm is used correctly. Our empirical studies using various XACML policies have demonstrated that our approach is effective.


Sign in / Sign up

Export Citation Format

Share Document