We have proposed a number of approaches to extending the cryptographic access control schemes to incorporate adaptability. Specifically, we focused on cryptographic key management (CKM) in a hierarchy, where access is controlled by assigning each security class (group) a single key that allows the users to directly access information or derive the key required when the conditions of access are satisfied. We noted that cryptographically supported access control offers better security, for certain applications, than standard access control approaches. Cryptographic keys are used to encrypt the data so that irrespective of its location access is only possible if one holds a valid decryption key. In Chapter 5, we showed how cryptography can be used to secure outsourced data scenarios and proceeded in Chapters 6 and 7 to look at an approach to designing adaptive cryptographic access control mechanisms. This chapter summarizes our findings and offers perspectives for future work.
KeywordsAccess Control Access Control Policy Access Control Model Covert Channel Autonomic Computing
Unable to display preview. Download preview PDF.