Algorithms for unified hierarchy based access control

Abstract

Algorithms for unified hierarchy based access control ¡ Xukai Zou Department of Computer and Information Sciences Indiana University - Purdue University Indianapolis Indianapolis, IN 46202, USA Email: xkzou@cs.iupui.edu Byrav Ramamurthy, NV Vinodchandran, and Ravi K. Balachandran Department of Computer Science and Engineering University of Nebraska-Lincoln Lincoln, NE 68588, USA Email: ¢ byrav, vinod, ravib£ @csce.unl.edu ABSTRACT Access control is a fundamental security issue in any com- puter or communication system where there are users and resources. Recently a novel approach for access control, called unified hierarchy (UH), was proposed. In this pa- per, we present algorithms for implementing unified hier- archy and combining two unified hierarchies into one. Fur- ther, we propose typical queries for unified hierarchy and show that most of these queries can be executed

Publication
Proceedings of International Conference on Communications, Internet, and Information Technology, Scottzdale, AZ
Byrav Ramamurthy
Byrav Ramamurthy
Professor & PI

My research areas include optical and wireless networks, peer-to-peer networks for multimedia streaming, network security and telecommunications. My research work is supported by the U.S. National Science Foundation, U.S. Department of Energy, U.S. Department of Agriculture, NASA, AT&T Corporation, Agilent Tech., Ciena, HP and OPNET Inc.