Cryptographic enforcement of access control policies is a rapidly evolving field with ongoing research and development aimed at addressing emerging security challenges and requirements. Among the different techniques to cryptographically enforce ac- cess control policies, hierarchical key assignment schemes play a central role, since they can be used in a variety of application domains. In this talk, we give an overview of such a cryptographic primitive, by discussing different models, applications and future research directions.
Cryptographic Enforcement of Access Control Policies: Models, Applications, and Future Directions
Barbara Masucci
2024-01-01
Abstract
Cryptographic enforcement of access control policies is a rapidly evolving field with ongoing research and development aimed at addressing emerging security challenges and requirements. Among the different techniques to cryptographically enforce ac- cess control policies, hierarchical key assignment schemes play a central role, since they can be used in a variety of application domains. In this talk, we give an overview of such a cryptographic primitive, by discussing different models, applications and future research directions.File in questo prodotto:
Non ci sono file associati a questo prodotto.
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.