Information Security and Cryptology

Information Security and Cryptology

4.11 - 1251 ratings - Source

This book constitutes the refereed proceedings of the Second SKLOIS (State Key Laboratory of Information Security) Conference on Information Security and Cryptology, Inscrypt 2006 (formerly CISC), held in Beijing, China in November/December 2006. The 23 revised full papers presented were carefully reviewed and selected from 225 submissions. The papers are organized in topical sections on digital signature schemes, sequences and stream ciphers, symmetric-key cryptography, cryptographic schemes, network security, access control, computer and applications security, as well as Web and media security.However, the overheads for supporting all of the RBAC features and flexibility are significant as discussed in this paper. We designed the access control that the relationship model is simplified, and has no concepts of sessions, role ... We implemented the access control on the Solaris operating system as a prototype using a DLKM without any kernel changes ... [3] D.F. Ferraiolo, R. Sandhu, S. Gavrila, D.R. Kuhn, R. Chandramouli: Proposed NIST standard for role-based access controlanbsp;...

Title:Information Security and Cryptology
Author:Helger Lipmaa, Moti Yung, Donghai Lin
Publisher:Springer Science & Business Media - 2006-11-13


You Must CONTINUE and create a free account to access unlimited downloads & streaming