Abstract | ||
---|---|---|
Publicly Verifiable Outsourced Computation (PVC) allows devices with restricted resources to delegate computations to more powerful external servers, and to verify the correctness of results. Whilst beneficial in many situations, this increases the visibility and availability of potentially sensitive data, so we may wish to limit the sets of entities that can view input data and results. Additionally, it is highly unlikely that all users have identical and uncontrolled access to all functionality within an organization. Thus there is a need for access control mechanisms in PVC environments. In this work, we define a new framework for Publicly Verifiable Outsourced Computation with Access Control (PVC-AC) and discuss the security models and forms of access control policies that are necessary in such environments. |
Year | DOI | Venue |
---|---|---|
2014 | 10.1145/2714576.2714636 | ASIACCS |
Keywords | DocType | Volume |
cryptographic controls,access controls,key assignment scheme,publicly verifiable outsourced computation,information flow controls,access control policies | Journal | 2014 |
Citations | PageRank | References |
3 | 0.38 | 14 |
Authors | ||
4 |
Name | Order | Citations | PageRank |
---|---|---|---|
James Alderman | 1 | 4 | 2.43 |
Carlos Cid | 2 | 71 | 7.02 |
Jason Crampton | 3 | 1077 | 68.52 |
Christian Janson | 4 | 3 | 1.40 |