4 research outputs found

    Cryptographycal protocols in the Egerfood Information System

    Get PDF
    In this article we present the cryptography of the food safety tracking sys- tem of the Regional Knowledge Center (EGERFOOD), which can be found in Eger, Hungary at the Eszterházy Károly College. We analyzed its requirements for the underlying information system. To build a user friendly system, which serves quickly and cost effectively the costumers, the providers, and the effected authorities by information, is a complex task. Furthermore, the system has to fulfill the strict requirements which one put up for data-safety and -encryption in case of a tracking system. We considered also these ones by setting up the EGERFOOD information model

    Using Cryptographic Hash Functions for Discretionary Access Control in Object-Oriented Databases

    No full text
    This is a discussion paper which presents a cryptographic solution for discretionary access control in object-oriented databases. Our approach is based on the use of pseudo-random functions and sibling intractable function families (SIFF). Each entity (object or class) in the object-oriented database model is associated with access keys that ensure secure access to that entity and all related entities. The main advantage of our approach is its ability to verify an access request during query processing. Pseudo-random functions and SIFF are applied in such a way that cryptographic keys can be generated from keys of related objects or users. The security of the system depends on the difficulty of predicting the output of pseudo-random functions and on finding extra collision for the sibling intractable function family. The authorization system supports ownership and granting/revoking of privileges

    Using Cryptographic Hash Functions for Discretionary Access Control in Object-Oriented Databases

    No full text
    Abstract: This is a discussion paper which presents a cryptographic solution for discretionary access control in object-oriented databases. Our approach is based on the use of pseudo-random functions and sibling intractable function families (SIFF). Each entity (object or class) in the object-oriented database model is associated with access keys that ensure secure access to that entity and all related entities. The main advantage of our approach is its ability toverify an access request during query processing. Pseudo-random functions and SIFF are applied in such away that cryptographic keys can be generated from keys of related objects or users. The security of the system depends on the di culty of predicting the output of pseudo-random functions and on nding extra collision for the sibling intractable function family. The authorization system supports ownership and granting/revoking of privileges

    Annales Mathematicae et Informaticae (34.)

    Get PDF
    corecore