Attribute-Based Encryption and Access Control (Record no. 129128)

000 -LEADER
fixed length control field 06727cam a2200685Ki 4500
001 - CONTROL NUMBER
control field 9781351210607
003 - CONTROL NUMBER IDENTIFIER
control field FlBoTFG
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220509193049.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS--GENERAL INFORMATION
fixed length control field m d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cnu---unuuu
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 200307s2020 flu o 000 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency OCoLC-P
Language of cataloging eng
Transcribing agency OCoLC-P
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781351210591
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1351210599
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781351210584
-- (ePub ebook)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1351210580
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781351210577
-- (Mobipocket ebook)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1351210572
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781351210607
-- (ebook)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1351210602
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Cancelled/invalid ISBN 9780815381358 (hbk.)
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1201/9781351210607
Source of number or code doi
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)1143624671
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC-P)1143624671
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5105.59
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 021030
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 053000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code TEC
Subject category code subdivision 009060
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code UR
Source bicssc
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.824
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Huang, Dijiang.
245 10 - TITLE STATEMENT
Title Attribute-Based Encryption and Access Control
Medium [electronic resource] /
Statement of responsibility, etc Dijiang Huang, Qiuxiang Dong, Yan Zhu.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Boca Raton :
Name of publisher, distributor, etc CRC Press LLC,
Date of publication, distribution, etc 2020.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (339 pages).
336 ## -
-- text
-- rdacontent
336 ## -
-- still image
-- rdacontent
337 ## -
-- computer
-- rdamedia
338 ## -
-- online resource
-- rdacarrier
490 1# - SERIES STATEMENT
Series statement Data-enabled engineering
500 ## - GENERAL NOTE
General note Description based upon print version of record.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Cover -- Half Title -- Series Page -- Title Page -- Copyright Page -- Dedication -- Contents -- Preface -- Authors -- Contributors -- Part I: Foundations of Attribute-Based Encryption for Attribute-Based Access Control -- Chapter 1: Foundations of Attribute-Based Encryption -- 1.1 Attribute-Based Access Control-An ABE Approach -- 1.1.1 Motivation of ABE-Based Attribute-Based Access Control -- 1.1.2 Potentials and Issues of ABAC -- 1.2 Mathematical Background -- 1.2.1 Group and Cyclic Group -- 1.2.2 Prime-Order Bilinear Pairing -- 1.2.3 Composite-Order Bilinear Pairing
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 1.3 Basic Construction Components of ABE -- 1.3.1 Access Structure -- 1.3.2 Linear Secret-Sharing Scheme -- 1.3.3 Conversion Algorithm -- 1.3.4 Access Structure Example -- 1.3.5 Key-Policy Attribute-Based Encryption -- 1.3.6 Ciphertext-Policy Attribute-Based Encryption -- 1.4 Notations -- 1.5 Summary -- Chapter 2: Comparable Attribute-based Encryption -- 2.1 CCP-CABE Application Framework -- 2.2 Definition of Attribute Range and Problem Formulation -- 2.3 Composite Order Bilinear Map -- 2.4 Multi-Dimensional Range Derivation Function -- 2.5 CCP-CABE Overview -- 2.6 Security Model
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 2.7 Construction -- 2.7.1 System Setup (Setup) -- 2.7.2 Key Generation (KeyGen) -- 2.7.3 Encryption Delegation (EncDelegate) -- 2.7.4 Encryption (Encrypt) -- 2.7.5 Decryption Delegation (DecDelegate) -- 2.7.6 Decryption (Decrypt) -- 2.7.7 Application Scenarios -- 2.8 Extended Construction -- 2.8.1 ECCP-CABE Encryption -- 2.8.2 ECCP-CABE Decryption -- 2.9 Performance Evaluation -- 2.9.1 Complexity Analysis -- 2.9.2 Experiment -- 2.10 Security Analysis -- 2.10.1 Security for MRDF -- 2.10.2 Security for Key Collusion Attacks -- 2.10.3 Security for Chosen Delegation Key and Ciphertext Attacks
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 2.11 Summary -- Chapter 3: Privacy-Preserving Attribute-Based Encryption -- 3.1 Introduction -- 3.2 Related Works -- 3.3 Models -- 3.3.1 Attributes, Policy, and Anonymity -- 3.3.2 Broadcast with Attribute-Based Encryption -- 3.3.3 Bilinear Maps -- 3.3.4 Complexity Assumption -- 3.4 PP-CP-ABE Construction -- 3.4.1 PP-CP-ABE Construction Overview -- 3.4.2 Setup -- 3.4.3 Key Generation -- 3.4.4 Encryption -- 3.4.5 Decryption -- 3.4.6 Security Analysis -- 3.5 Privacy-Preserving Attribute-Based Broadcast Encryption -- 3.5.1 PP-AB-BE Setup -- 3.5.2 Broadcast Encryption
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 3.5.3 Information Theoretical Optimality -- 3.6 System Performance Assessment -- 3.6.1 Communication Overhead -- 3.6.2 Storage Overhead -- 3.6.3 Computation Overhead -- 3.7 Summary -- Chapter 4: Identity Revocable CP-ABE -- 4.1 Introduction -- 4.1.1 Research Contribution -- 4.2 Flexible Group Construction -- 4.3 Why Is the Two-Step ID-Revocable CP-ABE Approach NOT Secure? -- 4.4 Syntax and Security Model -- 4.4.1 Syntax of IR-CP-ABE -- 4.4.2 Security Model -- 4.4.3 Assumptions -- 4.5 Scheme Construction -- 4.5.1 One-ID Revocation for CP-ABE Scheme (OIDR-CP-ABE)
500 ## - GENERAL NOTE
General note 4.5.2 Multiple-ID Revocation for CP-ABE Scheme (MIDR-CP-ABE)
520 ## - SUMMARY, ETC.
Summary, etc This book covers a broader scope of Attribute-Based Encryption (ABE), from the background knowledge, to specific constructions, theoretic proofs, and applications. The goal is to provide in-depth knowledge usable for college students and researchers who want to have a comprehensive understanding of ABE schemes and novel ABE-enabled research and applications. The specific focus is to present the development of using new ABE features such as group-based access, ID-based revocation, and attributes management functions such as delegation, federation, and interoperability. These new capabilities can build a new ABE-based Attribute-Based Access Control (ABAC) solution that can incorporate data access policies and control into ciphertext. This book is also ideal for IT companies to provide them with the most recent technologies and research on how to implement data access control models for mobile and data-centric applications, where data access control does not need to rely on a fixed access control infrastructure. It's also of interested to those working in security, to enable them to have the most recent developments in data access control such as ICN and Blockchain technologies. Features Covers cryptographic background knowledge for ABE and ABAC Features various ABE constructions to achieve integrated access control capabilities Offers a comprehensive coverage of ABE-based ABAC Provides ABE applications with real-world examples Advances the ABE research to support new mobile and data-centric applications
588 ## -
-- OCLC-licensed vendor bibliographic record.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Identification.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data encryption (Computer science)
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computers
General subdivision Access control.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element COMPUTERS / Database Management / Data Mining
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element COMPUTERS / Security / General
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element TECHNOLOGY / Engineering / Industrial
Source of heading or term bisacsh
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Dong, Qiuxiang.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Zhu, Yan
Titles and other words associated with a name (Professor of computer security)
856 40 - ELECTRONIC LOCATION AND ACCESS
Materials specified Taylor & Francis
Uniform Resource Identifier https://www.taylorfrancis.com/books/9781351210607
856 42 - ELECTRONIC LOCATION AND ACCESS
Materials specified OCLC metadata license agreement
Uniform Resource Identifier http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf

No items available.

2017 | The Technical University of Kenya Library | +254(020) 2219929, 3341639, 3343672 | library@tukenya.ac.ke | Haile Selassie Avenue