You are on page 1of 3

R.

Terciu
Merel Koning , Paulan Korenhof , Gergely Alpr, and Jaap-Henk Hoepman -The ABC of ABC An Analysis of Attribute-Based Credentials in the Light of Data Protection, Privacy and Identity
Se pare ca astia au deja un produs pe piata, de studiat mai in detaliu ( folosesc accesul pe baza
de atribute in baza unui engine de verificat atributele dintr-o politica scrisa in XACML - nu cred
ca folosesc criptare bazata pe atribute).
http://www.axiomatics.com/attribute-based-access-control.html
Nuttapong Attrapadung1 , Benot Libert2? , and Elie de Panafieu3 - Expressive Key-Policy
Attribute-Based Encryption with Constant-Size Ciphertexts
Ciphertext policy Attribute based Encryption with anonymous access policy A.Balu1 ,
K.Kuppusamy2

Link-ul catre tool-ul CPABE- http://hms.isi.jhu.edu/acsc/cpabe/index.html


Prerequisites: apt-get install libssl-dev
PBC -https://crypto.stanford.edu/pbc/manual/ch01.html
Link-ul catre github CPABE WANG https://github.com/junwei-wang/cpabe
Explicatie buna si simpla pentru key-policy vs ciphertext-policy, pentru a putea fi folosita in
lucrare:
https://crypto.stackexchange.com/questions/17893/what-is-attribute-basedencryption/17894#17894?newreg=dd10eea6b72c4c50adfaf09e254044bb
Un articol foarte larg despre protocoale de access folosind atribute de la NIST:
http://nvlpubs.nist.gov/nistpubs/specialpublications/NIST.sp.800-162.pdf
Cateva informatii despre un limbaj de markup XACML folosit de ABAC:
https://www.oasisopen.org/committees/download.php/2713/Brief_Introduction_to_XACML.html#xacml-top

Articole gasite si descarcate


Articole negasite sau
inaccesibile

M.Togan

A. Sahai, B. Waters. (printre primele scheme de criptare bazata pe


atribute)
Fuzzy identity-based encryption, in Proc. of the EUROCRYPT, pp. 457473, 2005.

M. Pirretti, P. Traynor, P. McDaniel, B. Waters.


Secure attribute-based systems. In Proc of the 13th ACM conference
on Computer and communications security, pp 99-112. ACM Press New
York, USA, 2006.
V. Goyal, O. Pandey, A. Sahai, and B. Waters.
Attribute-Based Encryption for Fine-grained Access Control of
Encrypted Data. In Proc. of 13th ACM Conf. Computer and
communications security (CCS 06), pp. 89-98, 2006.
J. Bethencourt, A. Sahai, B. Waters.
Ciphertext-policy attribute-based encryption.In Proc. of the IEEE
Symposium on Security and Privacy (SP '07), pp. 321334, 2007.
L. Cheung, C. Newport.
Provably secure ciphertext policy ABE in Proc. of the 14th ACM
Conference on Computer and Communications Security (CCS '07), pp. 456
465, 2007.
T. Nishide, K. Yoneyama, K. Ohta.
Attribute-based encryption with partially hidden encryptor-specified
access structures in Applied Cryptography and Network Security (ACNS
2008), pp. 111129, Springer, Germany, 2008.
K. Emura, A. Miyaji, K. Omote, A. Nomura, M. Soshi,
A ciphertext-policy attribute-based encryption scheme with constant
ciphertext length International Journal of Applied Cryptography, vol.
2, no. 1, pp. 4659, 2010.
J. Zhang, Z. F. Zhang,
A ciphertext policy attribute-based encryption scheme without
pairings. In Information Security and Cryptology (ISC '12), pp. 324
340, Springer, Germany, 2012.
R. Bobba, H. Khurana, M. Prabhakaran.

AttributeSets: A Practically Motivated Enhancement to Attribute-Based


Encryption, July 27, 2009
R. Ostrovsky, B. Waters.
Attribute based encryption with nonmonotonic access structures. In
Proc. of the 14th ACM conference on Computer and communications
security, pp. 195-203, ACM New York, USA, 2007.
G. Wang, Q. Liu, J.Wu,
Hierachical attibute- based encryption for fine-grained access
control in cloud storage services," in Proc. of the 17th ACM
conference on Computer and communications security, 2010
G.Wang, Q. Liu, J.Wu, M. Guo,
"Hierarchical attribute-based encryption and scalable user revocation
for sharing data in cloud servers" Computer & Security, vol. 30, pp.
320-331, 2011.
M. Chase, S. S. Chow.
Improving privacy and security in multi-authority attribute-based
encryption in Proc. of Computer and communications security (CCS
09), pp. 121130, 2009.
V Bozovic, D Socek, R Steinwandt, V. I. Vil-lanyi.
Multiauthority attribute-based encryption with honest-but-curious
central authority". International Journal of Computer Mathematics,
Volume. 89, 2012.

You might also like