The rapid advances in the Information and Communication Technologies have brought to the development of on-demand high quality applications and services allowing users to easily access resources anywhere anytime. Users can pay for a service and access the resources made available during their subscriptions until the subscribed periods expire. Users are then forced to download such resources if they want to access them also after the subscribed periods. To avoid this burden to the users, we propose the adoption of a subscription-based access control policy that combines a flexible key derivation structure with selective encryption. The publication of new resources as well as the management of subscriptions are accommodated by adapting the key derivation structure in a transparent way for the users.

Enforcing subscription-based authorization policies in cloud scenarios / S. De Capitani di Vimercati, S. Foresti, S. Jajodia, G. Livraga - In: Data and applications security and privacy XXVI / [a cura di] N. Cuppens-Boulahia , F. Cuppens, J. Garcia-Alfaro. - Berlin : Springer, 2012 Jul. - ISBN 9783642315398. - pp. 314-329 (( Intervento presentato al 26. convegno Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec) tenutosi a Paris nel 2012.

Enforcing subscription-based authorization policies in cloud scenarios

S. De Capitani di Vimercati
Primo
;
S. Foresti
Secondo
;
G. Livraga
Ultimo
2012

Abstract

The rapid advances in the Information and Communication Technologies have brought to the development of on-demand high quality applications and services allowing users to easily access resources anywhere anytime. Users can pay for a service and access the resources made available during their subscriptions until the subscribed periods expire. Users are then forced to download such resources if they want to access them also after the subscribed periods. To avoid this burden to the users, we propose the adoption of a subscription-based access control policy that combines a flexible key derivation structure with selective encryption. The publication of new resources as well as the management of subscriptions are accommodated by adapting the key derivation structure in a transparent way for the users.
access control; subscription-based policies; data outsourcing
Settore INF/01 - Informatica
lug-2012
IFIP
Book Part (author)
File in questo prodotto:
Non ci sono file associati a questo prodotto.
Pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/2434/178318
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 16
  • ???jsp.display-item.citation.isi??? 6
social impact