This book constitutes the refereed proceedings of the Second SKLOIS (State Key Laboratory of Information Security) Conference on Information Security and Cryptology, Inscrypt 2006 (formerly CISC), held in Beijing, China in November/December 2006. The 23 revised full papers presented were carefully reviewed and selected from 225 submissions. The papers are organized in topical sections on digital signature schemes, sequences and stream ciphers, symmetric-key cryptography, cryptographic schemes, network security, access control, computer and applications security, as well as Web and media security.However, the overheads for supporting all of the RBAC features and flexibility are significant as discussed in this paper. We designed the access control that the relationship model is simplified, and has no concepts of sessions, role ... We implemented the access control on the Solaris operating system as a prototype using a DLKM without any kernel changes ...  D.F. Ferraiolo, R. Sandhu, S. Gavrila, D.R. Kuhn, R. Chandramouli: Proposed NIST standard for role-based access controlanbsp;...
|Title||:||Information Security and Cryptology|
|Author||:||Helger Lipmaa, Moti Yung, Donghai Lin|
|Publisher||:||Springer Science & Business Media - 2006-11-13|