• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations | Disambiguate

DMCA

Attribute-based Encryption with Break-glass

Cached

  • Download as a PDF

Download Links

  • [www.brucker.ch]
  • [www.brucker.ch]
  • [www.brucker.ch]
  • [www.brucker.ch]
  • [atlas.tk.informatik.tu-darmstadt.de]
  • [atlas.tk.informatik.tu-darmstadt.de]
  • [atlas.tk.informatik.tu-darmstadt.de]

  • Save to List
  • Add to Collection
  • Correct Errors
  • Monitor Changes
by Achim D. Brucker , Helmut Petritsch , Stefan G. Weber
Citations:10 - 3 self
  • Summary
  • Citations
  • Active Bibliography
  • Co-citation
  • Clustered Documents
  • Version History

BibTeX

@MISC{Brucker_attribute-basedencryption,
    author = {Achim D. Brucker and Helmut Petritsch and Stefan G. Weber},
    title = {Attribute-based Encryption with Break-glass},
    year = {}
}

Share

Facebook Twitter Reddit Bibsonomy

OpenURL

 

Abstract

Abstract Attribute-based Encryption (ABE) allows for implementing fine-grained decentralized access control based on properties or attributes a user has. Thus, there is no need for writing detailed, user-based policies in advance. This makes ABE in particular interesting for implementing security mechanisms in dynamic environments such as ubiquitous computing, disaster management, or health-care. For supporting the latter two application areas, common ABE approaches lack one important feature: break-glass, i. e., the controlled overriding of access control restrictions. In this paper we present an integration of break-glass into an approach for end-to-end secure information sharing using ABE techniques. Key words: access control, break-glass, attribute-based encryption, disaster management, trusted computing platform 1

Keyphrases

attribute-based encryption    disaster management    security mechanism    particular interesting    access control restriction    fine-grained decentralized access control    application area    abstract attribute-based encryption    common abe    key word    important feature    controlled overriding    access control    ubiquitous computing    dynamic environment    abe technique    user-based policy    end-to-end secure information   

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University