Skip to content

Algorithm Details

Bob Wall edited this page Jul 17, 2018 · 1 revision

We have two internal documents that we generated to guide our implementation and explain it: the first describes the algorithms and our tweaks to them (orig_algo.pdf), while the second contains more detail about our implementation choices (icl_impl.pdf). A newer, more complete description of the algorithm and its use in an access control system is available in the paper "Cryptographically Enforced Orthogonal Access Control at Scale" by B. Wall and P. Walsh, presented at the 2018 6th International Workshop on Security in Cloud Computing, which was held during the 2018 ACM AsiaCCS conference. The paper is available for download here.

Clone this wiki locally