메뉴 건너뛰기




Volumn 21, Issue 6, 2002, Pages 565-570

Hierarchical access control based on Chinese remainder theorem and symmetric algorithm

Author keywords

Access control; Chinese remainder theorem; Cryptographic key assignment; User hierarchy

Indexed keywords

ALGORITHMS; DATA COMMUNICATION SYSTEMS; DATA PRIVACY; DATA PROCESSING; INFORMATION RETRIEVAL SYSTEMS; SECURITY OF DATA; STORAGE ALLOCATION (COMPUTER);

EID: 0036396975     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/S0167-4048(02)01016-7     Document Type: Note
Times cited : (31)

References (7)
  • 1
    • 0033334588 scopus 로고    scopus 로고
    • Cryptographic key assignment scheme for dynamic access control in a user hierarchy
    • Sept
    • Kuo, F.H., Shen, V.R.L., Chen, T.S., and Lai, F., "Cryptographic key assignment scheme for dynamic access control in a user hierarchy," IEEE Proc. Computers & Digital Techniques, Vol. 146, No. 5, Sept. 1999, pp. 235-240.
    • (1999) IEEE Proc. Computers & Digital Techniques , vol.146 , Issue.5 , pp. 235-240
    • Kuo, F.H.1    Shen, V.R.L.2    Chen, T.S.3    Lai, F.4
  • 2
    • 0003614758 scopus 로고
    • Digitalized signatures and public-key functions as intractable as factorization
    • Technical Report, Computer Science, MIT/ LCS/ TR-212, MIT Lab
    • M.O. Rabin, "Digitalized signatures and public-key functions as intractable as factorization," Technical Report, Computer Science, MIT/ LCS/ TR-212, MIT Lab., Vol. 1, 1979, pp. 100-123.
    • (1979) , vol.1 , pp. 100-123
    • Rabin, M.O.1
  • 4
    • 84976752387 scopus 로고
    • Cryptographic solution to a problem of access control in a hierarchy
    • Akl, S. G., and Taylor, P. D. (1983), "Cryptographic solution to a problem of access control in a hierarchy," ACM Transactions on Computer Systems, 3(1), 239-247.
    • (1983) ACM Transactions on Computer Systems , vol.3 , Issue.1 , pp. 239-247
    • Akl, S.G.1    Taylor, P.D.2
  • 5
    • 0031344109 scopus 로고    scopus 로고
    • Dynamic key management schemes for access control in a hierarchy
    • Dec. 15
    • Lin, C.H., "Dynamic key management schemes for access control in a hierarchy," Computer Communications, Vol. 20, 15, Dec. 15, 1997, pp. 1381-1385.
    • (1997) Computer Communications , vol.20 , Issue.15 , pp. 1381-1385
    • Lin, C.H.1
  • 6
    • 0029210438 scopus 로고
    • A cryptographic implementation for dynamic access control in a user hierarchy
    • Tsai, H.M., and Chang, C.C. "A cryptographic implementation for dynamic access control in a user hierarchy," Computer and Security, 14, (2), 1995, pp. 857-959.
    • (1995) Computer and Security , vol.14 , Issue.2 , pp. 857-859
    • Tsai, H.M.1    Chang, C.C.2
  • 7
    • 0032689879 scopus 로고    scopus 로고
    • An improvement of novel cryptographic key assignment scheme for dynamic access control in a hierarchy
    • March
    • Min-Shiang Hwang, "An Improvement of Novel Cryptographic Key Assignment Scheme for Dynamic Access Control in a Hierarchy," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E82-A, No. 3, March 1999, pp. 548-550.
    • (1999) IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences , vol.E82-A , Issue.3 , pp. 548-550
    • Hwang, M.-S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.