메뉴 건너뛰기




Volumn 73, Issue 4, 2000, Pages 463-468

Asymmetric cryptographic key assignment scheme for access control in totally-ordered hierarchies

Author keywords

[No Author keywords available]

Indexed keywords

DATABASE SYSTEMS; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; PROBLEM SOLVING; SECURITY OF DATA;

EID: 0033751899     PISSN: 00207160     EISSN: None     Source Type: Journal    
DOI: 10.1080/00207160008804909     Document Type: Article
Times cited : (20)

References (15)
  • 1
    • 0020931264 scopus 로고
    • Cryptographic solution to a multilevel security problem
    • Akl, S. G. and Taylor, P. D. (1982). Cryptographic solution to a multilevel security problem, In: Proceedings of Crypto'82, pp. 237-249.
    • (1982) Proceedings of Crypto'82 , pp. 237-249
    • Akl, S.G.1    Taylor, P.D.2
  • 2
    • 84976752387 scopus 로고
    • Cryptographic solution to a problem of access control in a hierarchy
    • Akl, S. G. and Taylor, P. D. (1983). Cryptographic solution to a problem of access control in a hierarchy, ACM Transactions on Computer Systems, 1, 239-248.
    • (1983) ACM Transactions on Computer Systems , vol.1 , pp. 239-248
    • Akl, S.G.1    Taylor, P.D.2
  • 3
    • 0001692137 scopus 로고
    • Cryptographic key assignment scheme for access control in a hierarchy
    • Chang, C. C., Hwang, R. J. and Wu, T. C. (1992). Cryptographic key assignment scheme for access control in a hierarchy, Information Systems, 17, 243-247.
    • (1992) Information Systems , vol.17 , pp. 243-247
    • Chang, C.C.1    Hwang, R.J.2    Wu, T.C.3
  • 5
    • 0024012004 scopus 로고
    • The first ten years of public-key cryptography
    • Diffie, W. (1980). The first ten years of public-key cryptography, Proceedings of the IEEE, 76, 560-577.
    • (1980) Proceedings of the IEEE , vol.76 , pp. 560-577
    • Diffie, W.1
  • 7
    • 0000954459 scopus 로고
    • A cryptographic key generation scheme for multilevel data security
    • Harn, L. and Lin, H. Y. (1990). A cryptographic key generation scheme for multilevel data security, Computers and Security, 9, 539-546.
    • (1990) Computers and Security , vol.9 , pp. 539-546
    • Harn, L.1    Lin, H.Y.2
  • 8
    • 0027699915 scopus 로고
    • Modified chang-hwang-wu access control scheme
    • Hwang, M. S., Chang, C. C. and Yang, W. P. (1993). Modified chang-hwang-wu access control scheme, IEE Electronics Letters, 29, 2095-2096.
    • (1993) IEE Electronics Letters , vol.29 , pp. 2095-2096
    • Hwang, M.S.1    Chang, C.C.2    Yang, W.P.3
  • 9
    • 0031194544 scopus 로고    scopus 로고
    • A cryptographic key assignment scheme in a hierarchy for access control
    • Hwang, M. S. (1997). A cryptographic key assignment scheme in a hierarchy for access control, To appear in Mathematical and Computer Modelling.
    • (1997) Mathematical and Computer Modelling
    • Hwang, M.S.1
  • 10
    • 0022115074 scopus 로고
    • An optimal algorithm for assigning cryptographic keys to control access in a hierarchy
    • Mackinnon, S. J., Taylor, P. D., Meijer, H. and Akl, S. G. (1985). An optimal algorithm for assigning cryptographic keys to control access in a hierarchy, IEEE Transactions on Computers, 34, 797-802.
    • (1985) IEEE Transactions on Computers , vol.34 , pp. 797-802
    • Mackinnon, S.J.1    Taylor, P.D.2    Meijer, H.3    Akl, S.G.4
  • 11
    • 0024014116 scopus 로고
    • Protocol failures in cryptosystems
    • Moore, J. H. (1988). Protocol failures in cryptosystems, Proceedings of IEEE, 76, 594-602.
    • (1988) Proceedings of IEEE , vol.76 , pp. 594-602
    • Moore, J.H.1
  • 12
    • 0003614758 scopus 로고
    • Digitalized signatures and public-key functions as intractable as factorization
    • Laboratory for Computer Science, Massachusetts Institute of Technology, Cambridge, Mass.
    • Rabin, M. O. (1979). Digitalized signatures and public-key functions as intractable as factorization, Technical Report MIT/LCS/TR-212, Laboratory for Computer Science, Massachusetts Institute of Technology, Cambridge, Mass.
    • (1979) Technical Report MIT/LCS/TR-212
    • Rabin, M.O.1
  • 13
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public key cryptosystems
    • Rivest, R. L., Shamir, A. and Adleman, L. (1978). A method for obtaining digital signatures and public key cryptosystems, Communications of the ACM, 21, 120-126.
    • (1978) Communications of the ACM , vol.21 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 14
    • 0023962708 scopus 로고
    • Cryptographic implementation of a tree hierarchy for access control
    • Sandhu, R. S. (1988). Cryptographic implementation of a tree hierarchy for access control, Information Processing Letters, 27, 95-98.
    • (1988) Information Processing Letters , vol.27 , pp. 95-98
    • Sandhu, R.S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.