Abstract
The design of a secure file system based on user controlled cryptographic (UCC) transformations is investigated. With UCC transformations, cryptography not only complements other protection mechanisms, but can also enforce protection specifications. Files with different access permissions are enciphered by different cryptographic keys supplied by authorized users at access time. Several classes of protection policies such as: compartmentalized, hierarchical, and data dependent are discussed. Several protection implementation schemes are suggested and analyzed according to criteria such as: security, efficiency, and user convenience. These schemes provide a versatile and powerful set of design alternatives.
| Original language | English |
|---|---|
| Pages (from-to) | 411-420 |
| Number of pages | 10 |
| Journal | IEEE Transactions on Software Engineering |
| Volume | SE-6 |
| Issue number | 5 |
| DOIs | |
| State | Published - 1 Jan 1980 |
| Externally published | Yes |
Keywords
- Access control
- cryptography
- file security
- one way ciphers
- protection specifications
ASJC Scopus subject areas
- Software
Fingerprint
Dive into the research topics of 'The Design of a Cryptography Based Secure File System'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver