Entry Crampton:2011:PEC from tissec.bib

Last update: Sun Oct 15 02:58:48 MDT 2017                Valid HTML 3.2!

Index sections

Top | Symbols | Numbers | Math | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

BibTeX entry

@Article{Crampton:2011:PEC,
  author =       "Jason Crampton",
  title =        "Practical and efficient cryptographic enforcement of
                 interval-based access control policies",
  journal =      j-TISSEC,
  volume =       "14",
  number =       "1",
  pages =        "14:1--14:??",
  month =        may,
  year =         "2011",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/1952982.1952996",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Thu Jun 2 07:27:23 MDT 2011",
  bibsource =    "http://portal.acm.org/;
                 http://www.math.utah.edu/pub/tex/bib/tissec.bib",
  abstract =     "The enforcement of access control policies using
                 cryptography has received considerable attention in
                 recent years and the security of such enforcement
                 schemes is increasingly well understood. Recent work in
                 the area has considered the efficient enforcement of
                 temporal and geo-spatial access control policies, and
                 asymptotic results for the time and space complexity of
                 efficient enforcement schemes have been obtained.
                 However, for practical purposes, it is useful to have
                 explicit bounds for the complexity of enforcement
                 schemes. In this article we consider interval-based
                 access control policies, of which temporal and
                 geo-spatial access control policies are special cases.
                 We define enforcement schemes for interval-based access
                 control policies for which it is possible, in almost
                 all cases, to obtain exact values for the schemes'
                 complexity, thereby subsuming a substantial body of
                 work in the literature.",
  acknowledgement = ack-nhfb,
  articleno =    "14",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

Related entries