Advertisement

Conclusions

  • Anne V. D. M. Kayem
  • Selim G. Akl
  • Patrick Martin
Chapter
Part of the Advances in Information Security book series (ADIS, volume 48)

Abstract

We have proposed a number of approaches to extending the cryptographic access control schemes to incorporate adaptability. Specifically, we focused on cryptographic key management (CKM) in a hierarchy, where access is controlled by assigning each security class (group) a single key that allows the users to directly access information or derive the key required when the conditions of access are satisfied. We noted that cryptographically supported access control offers better security, for certain applications, than standard access control approaches. Cryptographic keys are used to encrypt the data so that irrespective of its location access is only possible if one holds a valid decryption key. In Chapter 5, we showed how cryptography can be used to secure outsourced data scenarios and proceeded in Chapters 6 and 7 to look at an approach to designing adaptive cryptographic access control mechanisms. This chapter summarizes our findings and offers perspectives for future work.

Keywords

Access Control Access Control Policy Access Control Model Covert Channel Autonomic Computing 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer Science+Business Media, LLC 2010

Authors and Affiliations

  • Anne V. D. M. Kayem
    • 1
  • Selim G. Akl
    • 2
  • Patrick Martin
    • 2
  1. 1.Department of Computer ScienceCape TownSouth Africa
  2. 2.School of ComputingQueen’s UniversityKingstonCanada

Personalised recommendations