Implementation of Discretionary Security Policy in the Distributed Systems Based on the Secret Sharing Scheme
Title | Implementation of Discretionary Security Policy in the Distributed Systems Based on the Secret Sharing Scheme |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Belim, S.V., S.Yu, Belim |
Conference Name | 2019 International Multi-Conference on Industrial Engineering and Modern Technologies (FarEastCon) |
Date Published | oct |
Publisher | IEEE |
ISBN Number | 978-1-7281-0061-6 |
Keywords | Blakley's scheme, Collaboration, computer network security, discretionary security policy, forbidden information channels, matrix of access., Policy Based Governance, policy-based governance, polynomials, pubcrawl, secret sharing scheme, Shamir's scheme, sharing secretscheme, telecommunication channels |
Abstract | In this article the combination of secret sharing schemes and the requirement of discretionary security policy is considered. Secret sharing schemes of Shamir and Blakley are investigated. Conditions for parameters of schemes the providing forbidden information channels are received. Ways for concealment of the forbidden channels are suggested. Three modifications of the Shamir's scheme and two modifications of the Blakley's scheme are suggested. Transition from polynoms to exponential functions for formation the parts of a secret is carried out. The problem of masking the presence of the forbidden information channels is solved. Several approaches with the complete and partial concealment are suggested. |
URL | https://ieeexplore.ieee.org/document/8933972 |
DOI | 10.1109/FarEastCon.2019.8933972 |
Citation Key | belim_implementation_2019 |