Sept. 26, 2022, 1:36 p.m. |

IACR News www.iacr.org

ePrint Report: Cryptographic Role-Based Access Control, Reconsidered

Bin Liu, Antonis Michalas, Bogdan Warinschi


In this paper, we follow the line of existing study on cryptographic enforcement of Role-Based Access Control (RBAC). Inspired by the study of the relation between the existing security definitions for such system, we identify two different types of attacks which cannot be captured by the existing ones. Therefore, we propose two new security definitions towards the goal of appropriately modelling cryptographic enforcement of Role-Based Access Control …

access access control control eprint report role-based access control

Network Security Tools Engineer / Systems Engineer

@ Node.Digital | Arlington, Virginia, United States

Scrum Master II - Global Information Security PMO

@ Marriott International | Bethesda, MD, United States

Principle Security Incident Response Analyst

@ Oracle | United States

Cyber Network Engineer

@ Peraton | Aberdeen Proving Ground, MD, United States

Red Team Operator: Assessments & Exercises Vice President

@ JPMorgan Chase & Co. | Columbus, OH, United States

Cybersecurity Undergraduate - Internship

@ esure Group | Reigate, United Kingdom