Skip to main navigation Skip to search Skip to main content

Pesto flavoured security

  • Feike W. Dillema
  • , Tage Stabell-Kulø

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    52 Downloads (Pure)

    Abstract

    We demonstrate that symmetric-key cryptography can be used for both read and write access control. One-time write access can be granted by handing over an encryption key, and our encryption framework allows the revocation of previously granted rights. The number of keys to be managed explicitly grows linearly with the number of access control policies a user defines, making security manageable. The framework is used in the Pesto distributed storage system. In Pesto, policies can be stored the same as other data and the same mechanism can be used to control access to them. Delegation of authority over policies concerning different tasks can then be performed. Separating the different tasks of the system, allows for different tasks to be assigned to different sets of nodes. Nodes need then only be trusted wrt. the specific task(s) they have been assigned with.
    Original languageEnglish
    Title of host publicationProceedings 22nd International Symposium on Reliable Distributed Systems (SRDS)
    Place of PublicationLos Alamitos, CA
    PublisherIEEE
    Pages241-249
    Number of pages9
    ISBN (Print)0-7695-1955-5
    DOIs
    Publication statusPublished - Oct 2003
    Event22nd IEEE Symposium on Reliable Distributed Systems, SRDS 2003 - Florence, Italy
    Duration: 6 Oct 20038 Oct 2003
    Conference number: 22

    Publication series

    NameProceedings International Symposium on Reliable Distributed Systems (SRDS)
    PublisherIEEE
    Number22
    Volume2003
    ISSN (Print)1060-9857

    Conference

    Conference22nd IEEE Symposium on Reliable Distributed Systems, SRDS 2003
    Country/TerritoryItaly
    CityFlorence
    Period6/10/038/10/03

    Fingerprint

    Dive into the research topics of 'Pesto flavoured security'. Together they form a unique fingerprint.

    Cite this