Optimal Constructions for Chain-Based Cryptographic Enforcement of Information Flow Policies
The simple security property in an information flow policy can be enforced by encrypting data objects and distributing an appropriate secret to each user. A user derives a suitable decryption key from the secret and publicly available information. A chain-based enforcement scheme provides an alterna...
        Saved in:
      
    
          | Published in | Data and Applications Security and Privacy XXIX Vol. 9149; pp. 330 - 345 | 
|---|---|
| Main Authors | , , , | 
| Format | Book Chapter | 
| Language | English | 
| Published | 
        Switzerland
          Springer International Publishing AG
    
        2015
     Springer International Publishing  | 
| Series | Lecture Notes in Computer Science | 
| Subjects | |
| Online Access | Get full text | 
| ISBN | 3319208098 9783319208091  | 
| ISSN | 0302-9743 1611-3349 1611-3349  | 
| DOI | 10.1007/978-3-319-20810-7_23 | 
Cover
| Abstract | The simple security property in an information flow policy can be enforced by encrypting data objects and distributing an appropriate secret to each user. A user derives a suitable decryption key from the secret and publicly available information. A chain-based enforcement scheme provides an alternative method of cryptographic enforcement that does not require any public information, the trade-off being that a user may require more than one secret. For a given information flow policy, there will be many different possible chain-based enforcement schemes. In this paper, we provide a polynomial-time algorithm for selecting a chain-based scheme which uses the minimum possible number of secrets. We also compute the number of secrets that will be required and establish an upper bound on the number of secrets required by any user. | 
    
|---|---|
| AbstractList | The simple security property in an information flow policy can be enforced by encrypting data objects and distributing an appropriate secret to each user. A user derives a suitable decryption key from the secret and publicly available information. A chain-based enforcement scheme provides an alternative method of cryptographic enforcement that does not require any public information, the trade-off being that a user may require more than one secret. For a given information flow policy, there will be many different possible chain-based enforcement schemes. In this paper, we provide a polynomial-time algorithm for selecting a chain-based scheme which uses the minimum possible number of secrets. We also compute the number of secrets that will be required and establish an upper bound on the number of secrets required by any user. | 
    
| Author | Farley, Naomi Gutin, Gregory Crampton, Jason Jones, Mark  | 
    
| Author_xml | – sequence: 1 givenname: Jason surname: Crampton fullname: Crampton, Jason email: jason.crampton@rhul.ac.uk organization: Royal Holloway, University of London, London, UK – sequence: 2 givenname: Naomi surname: Farley fullname: Farley, Naomi organization: Royal Holloway, University of London, London, UK – sequence: 3 givenname: Gregory surname: Gutin fullname: Gutin, Gregory organization: Royal Holloway, University of London, London, UK – sequence: 4 givenname: Mark surname: Jones fullname: Jones, Mark organization: Royal Holloway, University of London, London, UK  | 
    
| BookMark | eNqNkctu1DAUQA0UxLT0D1j4BwzXvo4fS4haqFSpLGCHZDkepxPIxMHOqJq_r9NB3cLqPo-le3xOzqY0RULec_jAAfRHqw1DhtwyAYYD007gC3KOtfPU4C_JhivOGaK0r54HYM0Z2QCCYFZLfEM2lgujUDXwllyW8gsAeNMYaXBDft7Ny7D3I23TVJZ8CMtQE9qnTNudHyb22Ze4pW0-zku6z37eDYFeTXUe4j5OC009vVnLvV9Jej2mB_otjUMYYnlHXvd-LPHyb7wgP66vvrdf2e3dl5v20y3boTILs0b0UvnQmyBE0_RdJ1W0AWynOHiBW41K9ci11F5u_RZV7LSuhwIXovMeL0hzevcwzf744MfRzblelY-Og1tduurSoauC3JM6t7qsnDhxpa5P9zG7LqXf5V-QPEFzTn8OsSwurlSoMrIfw87PS8zFKWE02sYJyx2i-F-s_osGqZ6xR6UBlsU | 
    
| ContentType | Book Chapter | 
    
| Copyright | IFIP International Federation for Information Processing 2015 | 
    
| Copyright_xml | – notice: IFIP International Federation for Information Processing 2015 | 
    
| DBID | FFUUA ABOKW UNPAY  | 
    
| DEWEY | 005.8 | 
    
| DOI | 10.1007/978-3-319-20810-7_23 | 
    
| DatabaseName | ProQuest Ebook Central - Book Chapters - Demo use only Unpaywall for CDI: Monographs and Miscellaneous Content Unpaywall  | 
    
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: UNPAY name: Unpaywall url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/ sourceTypes: Open Access Repository  | 
    
| DeliveryMethod | fulltext_linktorsrc | 
    
| Discipline | Computer Science | 
    
| EISBN | 3319208101 9783319208107  | 
    
| EISSN | 1611-3349 | 
    
| Editor | Samarati, Pierangela | 
    
| Editor_xml | – sequence: 1 fullname: Samarati, Pierangela  | 
    
| EndPage | 345 | 
    
| ExternalDocumentID | oai:HAL:hal-01745832v1 EBC6287395_291_332 EBC5587046_291_332  | 
    
| GroupedDBID | 0D6 0DA 38. AABBV AAGZE AAZAK AAZUS ABBVZ ABFTD ABMNI ACKNT ACRRC AEDXK AEJLV AEKFX AETDV AEZAY ALMA_UNASSIGNED_HOLDINGS APFYR AZZ BBABE CZZ FFUUA I4C IEZ IY- LDH SBO SFQCF TMQGW TPJZQ TSXQS TWXRB Z7R Z7S Z7U Z7X Z7Y Z7Z Z81 Z83 Z84 Z85 Z88 -DT -GH -~X 1SB 29L 2HA 2HV 5QI 875 AASHB ACGFS ADCXD AEFIE EJD F5P FEDTE HVGLF LAS P2P RNI RSU SVGTG VI1 ~02 ABOKW UNPAY  | 
    
| ID | FETCH-LOGICAL-h368t-982f46acf8c2255fbb46e9c09b610a23d7366f31747a4dad36eb770800122baa3 | 
    
| IEDL.DBID | UNPAY | 
    
| ISBN | 3319208098 9783319208091  | 
    
| ISSN | 0302-9743 1611-3349  | 
    
| IngestDate | Sun Oct 26 03:08:59 EDT 2025 Wed Sep 17 04:00:58 EDT 2025 Thu May 29 01:00:16 EDT 2025 Wed May 28 23:42:57 EDT 2025  | 
    
| IsDoiOpenAccess | true | 
    
| IsOpenAccess | true | 
    
| IsPeerReviewed | true | 
    
| IsScholarly | true | 
    
| LCCallNum | QA76.9.A25QA76.9.D3Q | 
    
| Language | English | 
    
| License | cc-by | 
    
| LinkModel | DirectLink | 
    
| MergedId | FETCHMERGED-LOGICAL-h368t-982f46acf8c2255fbb46e9c09b610a23d7366f31747a4dad36eb770800122baa3 | 
    
| OCLC | 912863650 | 
    
| OpenAccessLink | https://proxy.k.utb.cz/login?url=https://inria.hal.science/hal-01745832 | 
    
| PQID | EBC5587046_291_332 | 
    
| PageCount | 16 | 
    
| ParticipantIDs | unpaywall_primary_10_1007_978_3_319_20810_7_23 springer_books_10_1007_978_3_319_20810_7_23 proquest_ebookcentralchapters_6287395_291_332 proquest_ebookcentralchapters_5587046_291_332  | 
    
| PublicationCentury | 2000 | 
    
| PublicationDate | 2015 | 
    
| PublicationDateYYYYMMDD | 2015-01-01 | 
    
| PublicationDate_xml | – year: 2015 text: 2015  | 
    
| PublicationDecade | 2010 | 
    
| PublicationPlace | Switzerland | 
    
| PublicationPlace_xml | – name: Switzerland – name: Cham  | 
    
| PublicationSeriesSubtitle | Information Systems and Applications, incl. Internet/Web, and HCI | 
    
| PublicationSeriesTitle | Lecture Notes in Computer Science | 
    
| PublicationSeriesTitleAlternate | Lect.Notes Computer | 
    
| PublicationSubtitle | 29th Annual IFIP WG 11. 3 Working Conference, DBSec 2015, Fairfax, VA, USA, July 13-15, 2015, Proceedings | 
    
| PublicationTitle | Data and Applications Security and Privacy XXIX | 
    
| PublicationYear | 2015 | 
    
| Publisher | Springer International Publishing AG Springer International Publishing  | 
    
| Publisher_xml | – name: Springer International Publishing AG – name: Springer International Publishing  | 
    
| RelatedPersons | Kleinberg, Jon M. Mattern, Friedemann Naor, Moni Mitchell, John C. Terzopoulos, Demetri Steffen, Bernhard Pandu Rangan, C. Kanade, Takeo Kittler, Josef Weikum, Gerhard Hutchison, David Tygar, Doug  | 
    
| RelatedPersons_xml | – sequence: 1 givenname: David surname: Hutchison fullname: Hutchison, David organization: Dept. Computer Sciences, Lancaster University, Lancaster, United Kingdom – sequence: 2 givenname: Takeo surname: Kanade fullname: Kanade, Takeo organization: Robotics Institute, Carnegie Mellon University, Pittsburgh, USA – sequence: 3 givenname: Josef surname: Kittler fullname: Kittler, Josef organization: Fac. Engineering & Physical Sciences, University of Surrey, Guildford, United Kingdom – sequence: 4 givenname: Jon M. surname: Kleinberg fullname: Kleinberg, Jon M. organization: Cornell University, Ithaca, USA – sequence: 5 givenname: Friedemann surname: Mattern fullname: Mattern, Friedemann organization: ETH Zürich, Zürich, Switzerland – sequence: 6 givenname: John C. surname: Mitchell fullname: Mitchell, John C. organization: Stanford University Dept. Computer Science, Stanford, USA – sequence: 7 givenname: Moni surname: Naor fullname: Naor, Moni organization: Computer Science, Weizmann Institute of Science, Rehovot, Israel – sequence: 8 givenname: C. surname: Pandu Rangan fullname: Pandu Rangan, C. organization: Indian Institute of Technology Madras, Chennai, India – sequence: 9 givenname: Bernhard surname: Steffen fullname: Steffen, Bernhard organization: Technical University of Dortmund, Dortmund, Germany – sequence: 10 givenname: Demetri surname: Terzopoulos fullname: Terzopoulos, Demetri organization: University of California, Los Angeles Dept. Computer Science, Los Angeles, USA – sequence: 11 givenname: Doug surname: Tygar fullname: Tygar, Doug organization: Management & Systems (SIMS), University of California, Berkeley Dept. Computer Science & Informatio, Berkeley, USA – sequence: 12 givenname: Gerhard surname: Weikum fullname: Weikum, Gerhard organization: Max Planck Institute for Informatics, Saarbrücken, Germany  | 
    
| SSID | ssj0001558483 ssj0002792  | 
    
| Score | 1.7698581 | 
    
| Snippet | The simple security property in an information flow policy can be enforced by encrypting data objects and distributing an appropriate secret to each user. A... | 
    
| SourceID | unpaywall springer proquest  | 
    
| SourceType | Open Access Repository Publisher  | 
    
| StartPage | 330 | 
    
| SubjectTerms | Computer security Cryptographic Primitive Hasse Diagram Information architecture Minimum Cost Flow Policy Decision Point Public Information  | 
    
| Title | Optimal Constructions for Chain-Based Cryptographic Enforcement of Information Flow Policies | 
    
| URI | http://ebookcentral.proquest.com/lib/SITE_ID/reader.action?docID=5587046&ppg=332 http://ebookcentral.proquest.com/lib/SITE_ID/reader.action?docID=6287395&ppg=332 http://link.springer.com/10.1007/978-3-319-20810-7_23 https://inria.hal.science/hal-01745832  | 
    
| UnpaywallVersion | submittedVersion | 
    
| Volume | 9149 | 
    
| hasFullText | 1 | 
    
| inHoldings | 1 | 
    
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1NSwMxEA3SHkQPfqOikoM3Sa1JNrs5ammVotWDlQpCSNIEi3VbbIvUX-9kP7R4ULztIYGQmSRvdua9QeiYU5d41ofbz8Yx4YAQ4MzFjjARWJReOJ8FijcdcdXl7V7UKwpkMy5MCvteewbcWbwAp_AN8W4c8ntw1VZFBJi7gqrdzt35Y54ioEQWlfQiaPIxLhc4cnn6P1B1KLx-dRKr0JloAU1-JUBX0PIsHev5ux4OF96Y1hq6LFeXl5a81GZTU7MfP4Qb_17-OloNDAYcqAWwaxtoyaWbaK3s34CL47yFnm7hvnjVQxy6dpY6shMMMDbMHaTkAp64Pm68zcfTXNl6YHEz8Jds9lMRjzwu6ExhJm4NR-84ExqG8HsbdVvN-8YVKbotkGcmkimRCfVcaOsTC2c88sZw4aStSwMIS1OwJxMCLAfxh-Z93WfCmTgOgPOMUqM120GVdJS6XYQBAvg6S-rW-zgoqAURwMhE0grHpeHJHiLl_qssJ1wUotp8XyYqiuAa4UJReaYYo3-OFxD3MRl9jz8pjarC8IkqxZnBGxRT4A0q8wYVvGEP1b7srsa5xsevE_b_O-EAVcCI7hDgy9Qcoep5s339cFT48CeUquuj | 
    
| linkProvider | Unpaywall | 
    
| linkToUnpaywall | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LSwMxEA7SHkQPvrGikoM3yVqTbHZz1NIqgo-DBQUhJGmC4rottkXqr3eyj1o8KN72kEDITJJvdub7BqEjTl3q2QBuP5skhANCgDOXOMJEYFF64XwRKF7fiMs-v3qIH6oC2YILk8O-R8-AO6sX4AS-Id5NQn4PrtqmiAFzN1Czf3N39limCCiRVSW9CJp8jMsFjlyZ_g9UHQqvX5skKnQmWkCT8wToClqe5iM9-9BZtvDG9NbQRb26srTkNZpOTGQ_fwg3_r38dbQaGAw4UAtg1zbQkss30VrdvwFXx3kLPd3CffGmMxy6dtY6smMMMDbMfcnJOTxxA9x5n40mpbL1i8XdwF-yxU9FPPS4ojOFmbiXDT9wITQM4fc26ve6951LUnVbIM9MpBMiU-q50NanFs547I3hwknblgYQlqZgTyYEWA7iD80HesCEM0kSAOcppUZrtoMa-TB3uwgDBPBtlrat90lQUAsigLGJpRWOS8PTFiL1_qsiJ1wVotpyX8YqjuEa4UJReaoYo3-OFxD3MRl_jz-ujarC8LGqxZnBGxRT4A2q8AYVvKGFornd1ajU-Ph1wt5_J-yjBhjRHQB8mZjDyne_AD926g4 | 
    
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Data+and+Applications+Security+and+Privacy+XXIX&rft.atitle=Optimal+Constructions+for+Chain-Based+Cryptographic+Enforcement+of+Information+Flow+Policies&rft.date=2015-01-01&rft.pub=Springer+International+Publishing+AG&rft.isbn=9783319208091&rft.volume=9149&rft_id=info:doi/10.1007%2F978-3-319-20810-7_23&rft.externalDBID=332&rft.externalDocID=EBC6287395_291_332 | 
    
| thumbnail_s | http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Febookcentral.proquest.com%2Fcovers%2F5587046-l.jpg http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Febookcentral.proquest.com%2Fcovers%2F6287395-l.jpg  |