Publication:
detecting flaws in dynamic hierarchical key management schemes using specification animation

dc.contributor.affiliationDA-IICT, Gandhinagar
dc.contributor.authorMundra, Anil
dc.contributor.authorMathuria, Anish
dc.contributor.authorDas, Maniklal
dc.contributor.researcherKumar, Naveen Sahu (201021001)
dc.contributor.researcherMundra, Anil (200911022)
dc.date.accessioned2025-08-01T13:09:17Z
dc.date.issued01-09-2012
dc.description.abstractIn key assignment schemes for hierarchical access control systems, each access class has a key associated with it that can be used to derive the keys associated with every descendant of that class. Many recently proposed key assignment schemes support updates to the hierarchy such as addition and deletion of classes and class relationships. The dynamic changes entail a change to the hierarchy as well as re-computing of public and secret information. In this paper, we describe a software tool that supports the animation of specifications of dynamic schemes. The specification of a scheme, written in Prolog, corresponds to a symbolic model of the algorithms used by the scheme for key generation and for handling dynamic changes. The tool allows us to generate a test hierarchy, generate keys for the classes in the hierarchy, and simulate various dynamic operations. The animation search using the tool has shown to be useful in finding previously unreported attacks on several existing dynamic schemes.
dc.format.extent166-176
dc.identifier.citationAnik Mundra, Mathuria, Anish, and Das, Manik Lal, "Detecting Flaws in Dynamic Hierarchical Key Management Schemes Using Specification Animation," in 8th International Conference on Distribution Computing and Internet Technology (ICDCIT'12), Bhubaneswar, India, 2-4 Feb. 2012, pp. 166-176. doi:10.1007/978-3-642-28073-3_15
dc.identifier.doi10.1007/978-3-642-28073-3_15
dc.identifier.issn2277-6702
dc.identifier.scopus2-s2.0-84857761251
dc.identifier.urihttps://ir.daiict.ac.in/handle/dau.ir/1809
dc.identifier.wosWOS:000306615100015
dc.language.isoen
dc.relation.ispartofseriesVol. 1; No. 2
dc.sourceCSI Journal of Computing
dc.titledetecting flaws in dynamic hierarchical key management schemes using specification animation
dspace.entity.typePublication
relation.isAuthorOfPublication078fff3e-c9c9-46b3-b171-66587e178807
relation.isAuthorOfPublicationb5cc5527-f42b-4c08-bdc3-50c4d46603a0
relation.isAuthorOfPublication078fff3e-c9c9-46b3-b171-66587e178807
relation.isAuthorOfPublication.latestForDiscovery078fff3e-c9c9-46b3-b171-66587e178807

Files

Collections