Get Free Shipping on orders over $79
Attribute-Based Encryption and Access Control : Data-Enabled Engineering - Dijiang Huang

Attribute-Based Encryption and Access Control

By: Dijiang Huang, Qiuxiang Dong, Yan Zhu

eText | 25 February 2020 | Edition Number 1

At a Glance

eText


$102.30

or 4 interest-free payments of $25.57 with

 or 

Instant online reading in your Booktopia eTextbook Library *

Why choose an eTextbook?

Instant Access *

Purchase and read your book immediately

Read Aloud

Listen and follow along as Bookshelf reads to you

Study Tools

Built-in study tools like highlights and more

* eTextbooks are not downloadable to your eReader or an app and can be accessed via web browsers only. You must be connected to the internet and have no technical issues with your device or browser that could prevent the eTextbook from operating.

This book covers a broader scope of Attribute-Based Encryption (ABE), from the background knowledge, to specific constructions, theoretic proofs, and applications. The goal is to provide in-depth knowledge usable for college students and researchers who want to have a comprehensive understanding of ABE schemes and novel ABE-enabled research and applications. The specific focus is to present the development of using new ABE features such as group-based access, ID-based revocation, and attributes management functions such as delegation, federation, and interoperability. These new capabilities can build a new ABE-based Attribute-Based Access Control (ABAC) solution that can incorporate data access policies and control into ciphertext. This book is also ideal for IT companies to provide them with the most recent technologies and research on how to implement data access control models for mobile and data-centric applications, where data access control does not need to rely on a fixed access control infrastructure. It's also of interested to those working in security, to enable them to have the most recent developments in data access control such as ICN and Blockchain technologies.

Features

  • Covers cryptographic background knowledge for ABE and ABAC

    Features various ABE constructions to achieve integrated access control capabilities

    Offers a comprehensive coverage of ABE-based ABAC

    Provides ABE applications with real-world examples

    Advances the ABE research to support new mobile and data-centric applications

on
Desktop
Tablet
Mobile

Other Editions and Formats

Paperback

Published: 30th September 2021

More in Data Mining

Investing for Programmers - Stefan Papp

eBOOK

Conquering the Decision Abyss - Keith Hartley

eBOOK

RRP $15.39

$14.99

Data Engineering for Data-Driven Marketing - Balamurugan Baluswamy

eBOOK

RRP $185.82

$157.99

15%
OFF