Data is key: introducing the data-based access control paradigm

Wolter Pieters, Qiang Tang

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Abstract

    According to the Jericho forum, the trend in information security is moving the security perimeter as close to the data as possible. In this context, we suggest the idea of data-based access control, where decryption of data is made possible by knowing enough of the data. Trust is thus based on what someone already knows. A specific problem is defined as follows: given n pieces of data, an agent is able to recover all n items once she knows k of them. The problem is similar to both secure sketches and secret sharing, and we show that both can be used as a basis for constructions. Examples of possible applications are granting access without credentials, recovering forgotten passwords and sharing personal data in social networks.
    Original languageUndefined
    Title of host publicationData and Applications Security 2009
    EditorsE. Gudes, J. Vaidya
    Place of PublicationBerlin
    PublisherSpringer
    Pages240-251
    Number of pages12
    ISBN (Print)978-3-642-03006-2
    DOIs
    Publication statusPublished - Jul 2009
    Event23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, DBSec 2009 - Montreal, Canada
    Duration: 12 Jul 200915 Jul 2009
    Conference number: 23

    Publication series

    NameLecture Notes in Computer Science
    PublisherSpringer Verlag
    Volume5645

    Conference

    Conference23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, DBSec 2009
    Abbreviated titleDBSec
    CountryCanada
    CityMontreal
    Period12/07/0915/07/09

    Keywords

    • METIS-264411
    • De-perimeterisation
    • IR-67816
    • EWI-15728
    • secure sketches
    • data-based access control
    • SCS-Cybersecurity
    • secret sharing

    Cite this

    Pieters, W., & Tang, Q. (2009). Data is key: introducing the data-based access control paradigm. In E. Gudes, & J. Vaidya (Eds.), Data and Applications Security 2009 (pp. 240-251). [10.1007/978-3-642-03007-9_16] (Lecture Notes in Computer Science; Vol. 5645). Berlin: Springer. https://doi.org/10.1007/978-3-642-03007-9_16