Presentation | 1996/10/14 Access Control in Encryption of Data Masaaki ISHIKANE, Hideki IMAI, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | Today, as network develops, illegal access to personal data or secret data becomes serious problem. To solve this, access control is used. But it relies extensively on the security of the system manager. In order to increase safety, we should decrease the relied part to the manager and encrypt data. In this report, we think about access control by encrypting data. And we compare the way using public key cryptography with the way using common key cryptography. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | Access Control / Encryption / Illegal Access / group |
Paper # | ISEC96-38 |
Date of Issue |
Conference Information | |
Committee | ISEC |
---|---|
Conference Date | 1996/10/14(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Information Security (ISEC) |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | Access Control in Encryption of Data |
Sub Title (in English) | |
Keyword(1) | Access Control |
Keyword(2) | Encryption |
Keyword(3) | Illegal Access |
Keyword(4) | group |
1st Author's Name | Masaaki ISHIKANE |
1st Author's Affiliation | University of Tokyo Institute of Industrial Science() |
2nd Author's Name | Hideki IMAI |
2nd Author's Affiliation | University of Tokyo Institute of Industrial Science |
Date | 1996/10/14 |
Paper # | ISEC96-38 |
Volume (vol) | vol.96 |
Number (no) | 295 |
Page | pp.pp.- |
#Pages | 7 |
Date of Issue |