<?xml version="1.0" encoding="UTF-8"?>

<modsCollection xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.loc.gov/mods/v3" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-3.xsd">
<mods version="3.3">

<genre>conference paper</genre>

<titleInfo><title>Cryptographically enforced RBAC</title></titleInfo>


<note type="publicationStatus">published</note>


<note type="qualityControlled">yes</note>

<name type="personal">
  <namePart type="given">Anna</namePart>
  <namePart type="family">Ferrara</namePart>
  <role><roleTerm type="text">author</roleTerm> </role></name>
<name type="personal">
  <namePart type="given">Georg</namePart>
  <namePart type="family">Fuchsbauer</namePart>
  <role><roleTerm type="text">author</roleTerm> </role><identifier type="local">46B4C3EE-F248-11E8-B48F-1D18A9856A87</identifier></name>
<name type="personal">
  <namePart type="given">Bogdan</namePart>
  <namePart type="family">Warinschi</namePart>
  <role><roleTerm type="text">author</roleTerm> </role></name>







<name type="corporate">
  <namePart></namePart>
  <identifier type="local">KrPi</identifier>
  <role>
    <roleTerm type="text">department</roleTerm>
  </role>
</name>



<name type="conference">
  <namePart>CSF: Computer Security Foundations</namePart>
</name>






<abstract lang="eng">Cryptographic access control promises to offer easily distributed trust and broader applicability, while reducing reliance on low-level online monitors. Traditional implementations of cryptographic access control rely on simple cryptographic primitives whereas recent endeavors employ primitives with richer functionality and security guarantees. Worryingly, few of the existing cryptographic access-control schemes come with precise guarantees, the gap between the policy specification and the implementation being analyzed only informally, if at all. In this paper we begin addressing this shortcoming. Unlike prior work that targeted ad-hoc policy specification, we look at the well-established Role-Based Access Control (RBAC) model, as used in a typical file system. In short, we provide a precise syntax for a computational version of RBAC, offer rigorous definitions for cryptographic policy enforcement of a large class of RBAC security policies, and demonstrate that an implementation based on attribute-based encryption meets our security notions. We view our main contribution as being at the conceptual level. Although we work with RBAC for concreteness, our general methodology could guide future research for uses of cryptography in other access-control models. 
</abstract>

<originInfo><publisher>IEEE</publisher><dateIssued encoding="w3cdtf">2013</dateIssued><place><placeTerm type="text">New Orleans, LA, United States</placeTerm></place>
</originInfo>
<language><languageTerm authority="iso639-2b" type="code">eng</languageTerm>
</language>



<relatedItem type="host">
  <identifier type="ISI">000335225600008</identifier><identifier type="doi">10.1109/CSF.2013.15</identifier>
<part><extent unit="pages">115 - 129</extent>
</part>
</relatedItem>


<extension>
<bibliographicCitation>
<chicago>Ferrara, Anna, Georg Fuchsbauer, and Bogdan Warinschi. “Cryptographically Enforced RBAC,” 115–29. IEEE, 2013. &lt;a href=&quot;https://doi.org/10.1109/CSF.2013.15&quot;&gt;https://doi.org/10.1109/CSF.2013.15&lt;/a&gt;.</chicago>
<apa>Ferrara, A., Fuchsbauer, G., &amp;#38; Warinschi, B. (2013). Cryptographically enforced RBAC (pp. 115–129). Presented at the CSF: Computer Security Foundations, New Orleans, LA, United States: IEEE. &lt;a href=&quot;https://doi.org/10.1109/CSF.2013.15&quot;&gt;https://doi.org/10.1109/CSF.2013.15&lt;/a&gt;</apa>
<mla>Ferrara, Anna, et al. &lt;i&gt;Cryptographically Enforced RBAC&lt;/i&gt;. IEEE, 2013, pp. 115–29, doi:&lt;a href=&quot;https://doi.org/10.1109/CSF.2013.15&quot;&gt;10.1109/CSF.2013.15&lt;/a&gt;.</mla>
<short>A. Ferrara, G. Fuchsbauer, B. Warinschi, in:, IEEE, 2013, pp. 115–129.</short>
<ama>Ferrara A, Fuchsbauer G, Warinschi B. Cryptographically enforced RBAC. In: IEEE; 2013:115-129. doi:&lt;a href=&quot;https://doi.org/10.1109/CSF.2013.15&quot;&gt;10.1109/CSF.2013.15&lt;/a&gt;</ama>
<ieee>A. Ferrara, G. Fuchsbauer, and B. Warinschi, “Cryptographically enforced RBAC,” presented at the CSF: Computer Security Foundations, New Orleans, LA, United States, 2013, pp. 115–129.</ieee>
<ista>Ferrara A, Fuchsbauer G, Warinschi B. 2013. Cryptographically enforced RBAC. CSF: Computer Security Foundations, 115–129.</ista>
</bibliographicCitation>
</extension>
<recordInfo><recordIdentifier>2291</recordIdentifier><recordCreationDate encoding="w3cdtf">2018-12-11T11:56:48Z</recordCreationDate><recordChangeDate encoding="w3cdtf">2025-09-29T14:22:06Z</recordChangeDate>
</recordInfo>
</mods>
</modsCollection>
