Jan. 25, 2024, 2:10 a.m. | Shreya Meel, Sennur Ulukus

cs.CR updates on arXiv.org arxiv.org

Verifying user attributes to provide fine-grained access control to databases
is fundamental to an attribute-based authentication system. In such systems,
either a single (central) authority verifies all attributes, or multiple
independent authorities verify individual attributes distributedly to allow a
user to access records stored on the servers. While a \emph{central} setup is
more communication cost efficient, it causes privacy breach of \emph{all} user
attributes to a central authority. Recently, Jafarpisheh et al. studied an
information theoretic formulation of the \emph{distributed} …

access access control arxiv attributes authentication authority control databases distributed private private access records servers single system systems verify

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Senior Security Researcher - Linux MacOS EDR (Cortex)

@ Palo Alto Networks | Tel Aviv-Yafo, Israel

Sr. Manager, NetSec GTM Programs

@ Palo Alto Networks | Santa Clara, CA, United States

SOC Analyst I

@ Fortress Security Risk Management | Cleveland, OH, United States