메뉴 건너뛰기




Volumn 20, Issue 15, 1997, Pages 1381-1385

Dynamic key management schemes for access control in a hierarchy

Author keywords

Access control; Cryptographic key; Key assignment; Key management; Multilevel data security; Partially ordered set; User hierarchy

Indexed keywords

CRYPTOGRAPHY; DATABASE SYSTEMS; HIERARCHICAL SYSTEMS; USER INTERFACES;

EID: 0031344109     PISSN: 01403664     EISSN: None     Source Type: Journal    
DOI: 10.1016/s0140-3664(97)00100-x     Document Type: Article
Times cited : (81)

References (23)
  • 2
    • 0021138526 scopus 로고
    • Cryptographic checksums for multilevel database security
    • Oakland, CA. April 29-May 2
    • D.E. Denning, Cryptographic checksums for multilevel database security, Proc. IEEE Symp. on Security and Privacy, Oakland, CA. April 29-May 2, 1984, pp. 52-61.
    • (1984) Proc. IEEE Symp. on Security and Privacy , pp. 52-61
    • Denning, D.E.1
  • 4
    • 30244524130 scopus 로고
    • Scomp: A solution to multilevel security problem
    • July
    • L.J. Fraim, Scomp: a solution to multilevel security problem, IEEE Computer, July (1983), 126-143.
    • (1983) IEEE Computer , pp. 126-143
    • Fraim, L.J.1
  • 7
    • 0022582820 scopus 로고
    • A security policy and formal top level specification for a multilevel secure local area network
    • Oakland, CA, April 7-9
    • J. McHugh, A.P. Moore, A security policy and formal top level specification for a multilevel secure local area network, Proc. IEEE Symp. on Security and Privacy, Oakland, CA, April 7-9, 1986, pp. 43-39.
    • (1986) Proc. IEEE Symp. on Security and Privacy , pp. 43-139
    • McHugh, J.1    Moore, A.P.2
  • 8
    • 0023231848 scopus 로고
    • Specifications for multilevel security and a hook-up property
    • Oakland, CA, April 27-29
    • D. McCullough, Specifications for multilevel security and a hook-up property, Proc. IEEE Symp. on Security and Privacy, Oakland, CA, April 27-29, 1987, pp. 161-166.
    • (1987) Proc. IEEE Symp. on Security and Privacy , pp. 161-166
    • McCullough, D.1
  • 9
    • 0023861378 scopus 로고
    • A model for multilevel security in computer networks
    • New Orleans, LA, March
    • W.P. Lu, M.K. Sundareshaan, A model for multilevel security in computer networks, Proc. 1988 INFCOM, New Orleans, LA, March 1988, pp. 1095-1104.
    • (1988) Proc. 1988 INFCOM , pp. 1095-1104
    • Lu, W.P.1    Sundareshaan, M.K.2
  • 10
    • 84976752387 scopus 로고
    • Cryptographic solution to a problem of access control in a hierarchy
    • S.G. Akl, P.D. Taylor, Cryptographic solution to a problem of access control in a hierarchy, ACM Trans, on Computer System 1(3) (1983) 239-247.
    • (1983) ACM Trans, on Computer System , vol.1 , Issue.3 , pp. 239-247
    • Akl, S.G.1    Taylor, P.D.2
  • 11
    • 0022115074 scopus 로고
    • An optimal algorithm for assigning cryptographic keys to control access in a hierarchy
    • S.T. Mackinnon, P.D. Taylor, H. Meijer, S.G. Akl, An optimal algorithm for assigning cryptographic keys to control access in a hierarchy, IEE Trans. Computers C-34(9) (1985) 797-802.
    • (1985) IEE Trans. Computers , vol.C-34 , Issue.9 , pp. 797-802
    • Mackinnon, S.T.1    Taylor, P.D.2    Meijer, H.3    Akl, S.G.4
  • 12
    • 0000954459 scopus 로고
    • A cryptographic keys generation scheme for multilevel data security
    • L. Harn, H.Y. Lin, A cryptographic keys generation scheme for multilevel data security, Computer Security 9 (1990) 539-546.
    • (1990) Computer Security , vol.9 , pp. 539-546
    • Harn, L.1    Lin, H.Y.2
  • 13
    • 0023962708 scopus 로고
    • Cryptographic implementation of a tree hierarchy for access control
    • R.A. Sandu, Cryptographic implementation of a tree hierarchy for access control, Information Processing Letters 27 (1988) 95-98.
    • (1988) Information Processing Letters , vol.27 , pp. 95-98
    • Sandu, R.A.1
  • 14
    • 0001692137 scopus 로고
    • Cryptographic key assignment scheme for access control in a hierarchy
    • C.C. Chang, R.J. Hwang, T.C. Wu, Cryptographic key assignment scheme for access control in a hierarchy, Information Systems 17(3) (1992) 243-247.
    • (1992) Information Systems , vol.17 , Issue.3 , pp. 243-247
    • Chang, C.C.1    Hwang, R.J.2    Wu, T.C.3
  • 15
  • 17
    • 0029210438 scopus 로고
    • A cryptographic implementation for dynamic access control in a user hierarchy
    • H.M. Tsai, C.C. Chang, A cryptographic implementation for dynamic access control in a user hierarchy, Computer and Security 14 (1995) 159-166.
    • (1995) Computer and Security , vol.14 , pp. 159-166
    • Tsai, H.M.1    Chang, C.C.2
  • 18
    • 0006425134 scopus 로고
    • Assigning digital key pairs to determine relationships in a user hierarchy structure
    • C.C. Chang, H.T. Liaw, Assigning digital key pairs to determine relationships in a user hierarchy structure, Transactions of Information Processing Society of Japan 35(10) (1994) 2189-2196.
    • (1994) Transactions of Information Processing Society of Japan , vol.35 , Issue.10 , pp. 2189-2196
    • Chang, C.C.1    Liaw, H.T.2
  • 19
    • 0028422916 scopus 로고
    • A scheme to determine the relationship between two users in a hierarchy
    • C.C. Chang, J.K. Jan, D.J. Buehrer, A scheme to determine the relationship between two users in a hierarchy, Computers and Security 13 (1994) 255-261.
    • (1994) Computers and Security , vol.13 , pp. 255-261
    • Chang, C.C.1    Jan, J.K.2    Buehrer, D.J.3
  • 20
    • 38249010116 scopus 로고
    • Hierarchy representations based on arithmetic coding for dynamic information protection systems
    • C.H. Lin, C.C. Chang, R.C.T. Lee, Hierarchy representations based on arithmetic coding for dynamic information protection systems, Information Schemes 64 1-2 (1992) 35-48.
    • (1992) Information Schemes , vol.64 , Issue.1-2 , pp. 35-48
    • Lin, C.H.1    Chang, C.C.2    Lee, R.C.T.3
  • 21
    • 0002242788 scopus 로고
    • A key management approach for access control in user hierarchies
    • Hsinchu, Taiwan
    • G. Horng, A key management approach for access control in user hierarchies, Proc. of International Computer Symposium, Hsinchu, Taiwan, 1994, pp. 439-444.
    • (1994) Proc. of International Computer Symposium , pp. 439-444
    • Horng, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.