Hierarchy-based access control in distributed environments

Jean Camille Birget, Xukai Zou, Guevara Noubir, Byrav Ramamurthy

Research output: Contribution to journalArticlepeer-review

40 Scopus citations


Access control is a fundamental concern in any system that manages resources, e.g., operating systems, file systems, databases and communications systems. The problem we address is how to specify, enforce, and implement access control in distributed environments. This problem occurs in many applications such as management of distributed project resources, e-newspaper and pay TV subscription services. Starting from an access relation between users and resources, we derive a user hierarchy, a resource hierarchy, and a unified hierarchy. The unified hierarchy is then used to specify the access relation in a way that is compact and that allows efficient queries. It is also used in cryptographic schemes that enforce the access relation. We introduce three specific cryptography based hierarchical schemes, which can effectively enforce and implement access control and are designed for distributed environments because they do not need the presence of a central authority (except perhaps for setup).

Original languageEnglish (US)
Pages (from-to)229-233
Number of pages5
JournalIEEE International Conference on Communications
StatePublished - 2001

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Electrical and Electronic Engineering


  • Access hierarchies
  • Distributed access control
  • Information and communication security


Dive into the research topics of 'Hierarchy-based access control in distributed environments'. Together they form a unique fingerprint.

Cite this