메뉴 건너뛰기




Volumn , Issue , 1991, Pages 422-429

A branch oriented key management solution to dynamic access control in a hierarchy

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER PROGRAMMING; COMPUTER SCIENCE;

EID: 0004676563     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SOAC.1991.143913     Document Type: Conference Paper
Times cited : (13)

References (18)
  • 4
    • 84920472394 scopus 로고
    • A security policy and formal top level specification for a multilevel secure local area network
    • J. McHugh and A. P. Morre, "A security policy and formal top level specification for a multilevel secure local area network." Proceedings of IEEE Symposium on Security & Privacy, pp. 34-39, 1986.
    • (1986) Proceedings of IEEE Symposium on Security & Privacy , pp. 34-39
    • McHugh, J.1    Morre, A.P.2
  • 6
    • 0023861378 scopus 로고
    • A model for multilevel security in computer networks
    • W. P. Lu and M. K. Sundareshan, "A model for multilevel security in computer networks, " Proceedings of INFOCOM, pp. 1095-1104, 1988.
    • (1988) Proceedings of INFOCOM , pp. 1095-1104
    • Lu, W.P.1    Sundareshan, M.K.2
  • 7
    • 0003400251 scopus 로고
    • Secure computer system: Unified exposition and multics interpretation
    • MITRE corp. Bedford, Mass., Mar
    • D. E. Bell and L. J. Lapadula, "Secure computer system: Unified exposition and multics interpretation, " Technical Report, NTR-2997, MITRE corp. Bedford, Mass., Mar. 1976.
    • (1976) Technical Report, NTR-2997
    • Bell, D.E.1    Lapadula, L.J.2
  • 8
    • 0020778471 scopus 로고
    • Scomp: A solution to multilevel security problem
    • July
    • L. J. Fraim, "Scomp: A solution to multilevel security problem, " IEEE Computer, pp. 26-143 July 1983.
    • (1983) IEEE Computer , pp. 26-143
    • Fraim, L.J.1
  • 9
    • 0020931264 scopus 로고
    • Cryptographic solution to a multilevel security problem
    • Springer-Verlag
    • S. G. Akl and P. D. Taylor, "Cryptographic solution to a multilevel security problem, " Proceedings of CRYPTO'82, pp. 237-250, Springer-Verlag, 1983.
    • (1983) Proceedings of CRYPTO'82 , pp. 237-250
    • Akl, S.G.1    Taylor, P.D.2
  • 10
    • 84976752387 scopus 로고
    • Cryptographic solution to a problem of access control in a hierarchy
    • Aug.
    • S. G. Akl and P. D. Taylor, "Cryptographic solution to a problem of access control in a hierarchy, " ACM Transactions on computer Systems vol. 1, no. 3, Aug. 1983.
    • (1983) ACM Transactions on Computer Systems , vol.1 , Issue.3
    • Akl, S.G.1    Taylor, P.D.2
  • 11
    • 0017930809 scopus 로고
    • A method for obtaining digital signature and public-key cryptosystems
    • R. L. Rivest, A. Shamir and L. Adleman, "A method for obtaining digital signature and public-key cryptosystems, " Communication ACM, vol. 21, no. 2, pp. 120-126, 1978.
    • (1978) Communication ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 12
    • 0022115074 scopus 로고
    • An optimal algorithm for assigning cryptographic keys to access control in a hierarchy
    • Sept
    • S. J. MacKinnon, P. D. Taylor, H. Meijer and S. G. Akl, "An optimal algorithm for assigning cryptographic keys to access control in a hierarchy, " IEEE Transactions on Computers, C-34, pp. 797-802, Sept. 1985.
    • (1985) IEEE Transactions on Computers , vol.C-34 , pp. 797-802
    • MacKinnon, S.J.1    Taylor, P.D.2    Meijer, H.3    Akl, S.G.4
  • 13
    • 0023962708 scopus 로고
    • Cryptographic Implementation of a tree hierarchy; for access control
    • R. S. Sandhu, "Cryptographic Implementation of a tree hierarchy; for access control" Information Processing Letters 27, pp. 95-98, 1988.
    • (1988) Information Processing Letters , vol.27 , pp. 95-98
    • Sandhu, R.S.1
  • 14
    • 0347160739 scopus 로고
    • Flexible access control with master keys
    • Aug, The complete version to be published by Springer-Verlag
    • G. C. Chick and S. E. Tavares, "Flexible access control with master keys, " Abstract Proceedings of CRYPTO'89, pp. 297-303, Aug. 1989. (The complete version to be published by Springer-Verlag)
    • (1989) Abstract Proceedings of CRYPTO'89 , pp. 297-303
    • Chick, G.C.1    Tavares, S.E.2
  • 16
    • 84919085619 scopus 로고
    • An improved algorithm for computing logarithms over GF (P) and its cryptographic significance
    • S. Pohlig and M. E. Hellman, "An improved algorithm for computing logarithms over GF (P) and its cryptographic significance, " IEEE Transactions on Information Theory, vol. IT-24, pp. 106-110, 1978.
    • (1978) IEEE Transactions on Information Theory , vol.IT-24 , pp. 106-110
    • Pohlig, S.1    Hellman, M.E.2
  • 17
    • 0020180459 scopus 로고
    • A conference key distribution system
    • I. Ingemarsson, D. T. Tang and C. K. Wong, " A conference key distribution system, " IEEE Trans., IT-28, pp. 714-720, 1982.
    • (1982) IEEE Trans. , vol.IT-28 , pp. 714-720
    • Ingemarsson, I.1    Tang, D.T.2    Wong, C.K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.