SLIDE 1
How to Control Read Access to a Data Packet?
Name-Based Access Control and others: – Data Encryption Keys (DEK) to secure data. – Key Encryption Keys (KEK) for those who got read access.
2
Schematized Access Control for Data Cubes and Trees Claudio Marxer - - PowerPoint PPT Presentation
Schematized Access Control for Data Cubes and Trees Claudio Marxer Christian Tschudin < claudio.marxer@unibas.ch > < christian.tschudin@unibas.ch > Computer Networks Group University of Basel Switzerland ACM ICN 17, Berlin
2
2
2
3
describes defines mapping
4
describes
Derivation (cooking)
4