메뉴 건너뛰기




Volumn 21, Issue 8, 2002, Pages 750-759

A practical key management scheme for access control in a user hierarchy

Author keywords

Access control; Hash function; Key management; Randomization; User hierarchy

Indexed keywords

DATA STORAGE EQUIPMENT; INFORMATION MANAGEMENT; SECURITY OF DATA; TOPOLOGY;

EID: 0036920852     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/S0167-4048(02)00815-5     Document Type: Article
Times cited : (36)

References (32)
  • 1
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • Dorothy E. Denning. A lattice model of secure information flow. Communications of the ACM, 19(5):236-243, 1976.
    • (1976) Communications of the ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.1
  • 3
    • 0023861378 scopus 로고
    • A model for multilevel security in computer networks
    • W.P. Lu and M.K. Sundareshan. A model for multilevel security in computer networks. In INFOCOM, pages 1095-1104, 1988.
    • (1988) INFOCOM , pp. 1095-1104
    • Lu, W.P.1    Sundareshan, M.K.2
  • 4
    • 85043778865 scopus 로고
    • Membership authentication for hierarchical multi-groups using the extended Fiat-Sharnir scheme
    • Advances in Cryptology - Proceedings of CRYPTO 90
    • K. Ohta, T. Okamoto, and K. Koyama. Membership authentication for hierarchical multi-groups using the extended Fiat-Sharnir scheme. In Advances in Cryptology - Proceedings of CRYPTO 90, volume 473 of Lecture Notes in Computer Science, pages 446-457, 1991.
    • (1991) Lecture Notes in Computer Science , vol.473 , pp. 446-457
    • Ohta, K.1    Okamoto, T.2    Koyama, K.3
  • 6
    • 0020931264 scopus 로고
    • Cryptographic solution in a multilevel security problem
    • Selim G. Akl and Peter D. Taylor. Cryptographic solution in a multilevel security problem. In CRYPTO '82, pages 237-459, 1983.
    • (1983) CRYPTO '82 , pp. 237-459
    • Akl, S.G.1    Taylor, P.D.2
  • 7
    • 84976752387 scopus 로고
    • Cryptographic solution to a problem of access control in a hierarchy
    • Selim G. Akl and Peter D. Taylor. Cryptographic solution to a problem of access control in a hierarchy. ACM Transactions on Computer Systems, 1(3):239-248, 1983.
    • (1983) ACM Transactions on Computer Systems , vol.1 , Issue.3 , pp. 239-248
    • Akl, S.G.1    Taylor, P.D.2
  • 8
    • 0022115074 scopus 로고
    • An optimal algorithm for assigning cryptographic keys to control access in a hierarchy
    • Stephen J. MacKinnon, Peter D. Taylor, Henk Meijer, and Selim G. Akl. An optimal algorithm for assigning cryptographic keys to control access in a hierarchy. IEEE Transactions on Computers, 34(0):797-802, 1985.
    • (1985) IEEE Transactions on Computers , vol.34 , pp. 797-802
    • MacKinnon, S.J.1    Taylor, P.D.2    Meijer, H.3    Akl, S.G.4
  • 9
    • 0023962708 scopus 로고
    • Cryptographic implementation of a tree hierarchy for access control
    • Ravi S. Sandhu. Cryptographic implementation of a tree hierarchy for access control, Information Processing Letters, 27(2):95-98, 1988.
    • (1988) Information Processing Letters , vol.27 , Issue.2 , pp. 95-98
    • Sandhu, R.S.1
  • 10
    • 84894043862 scopus 로고
    • Flexible access control with master keys
    • Advances in Cryptology - Proceedings of CRYPTO 89
    • G.C. Chick and S.E. Tavares. Flexible access control with master keys. In Advances in Cryptology - Proceedings of CRYPTO 89, volume 435 of Lecture Notes in Computer Science, pages 316-322, 1990.
    • (1990) Lecture Notes in Computer Science , vol.435 , pp. 316-322
    • Chick, G.C.1    Tavares, S.E.2
  • 11
    • 0000954459 scopus 로고
    • A cryptographic key generation scheme for multilevel data security
    • L. Ham and H.Y. Lin. A cryptographic key generation scheme for multilevel data security. Computers and Security, 9:539-546, 1990.
    • (1990) Computers and Security , vol.9 , pp. 539-546
    • Ham, L.1    Lin, H.Y.2
  • 12
    • 0004676563 scopus 로고
    • A brach orientated key management solution to dynamic access control in a hierarchy
    • C.S. Laih and T. Hwang. A brach orientated key management solution to dynamic access control in a hierarchy. In IEEE Symposium on Applied Computing, pages 422-429, 1991.
    • (1991) IEEE Symposium on Applied Computing , pp. 422-429
    • Laih, C.S.1    Hwang, T.2
  • 13
    • 0001692137 scopus 로고
    • Cryptographic key assignment scheme for access control in a hierarchy
    • C.C. Chang, R.J. Hwang, and T.C. Wu. Cryptographic key assignment scheme for access control in a hierarchy. Information Systems, 17(3):243-247, 1992.
    • (1992) Information Systems , vol.17 , Issue.3 , pp. 243-247
    • Chang, C.C.1    Hwang, R.J.2    Wu, T.C.3
  • 14
    • 38249003211 scopus 로고
    • Access control in a hierarchy using a one-way trap door function
    • C.C. Chang and D.J. Buehrer. Access control in a hierarchy using a one-way trap door function. Computers and Mathematics with Applications, 26(5):71-76, 1993.
    • (1993) Computers and Mathematics with Applications , vol.26 , Issue.5 , pp. 71-76
    • Chang, C.C.1    Buehrer, D.J.2
  • 16
    • 0002360145 scopus 로고
    • Controlling access in tree hierarchies
    • T.C. Wu and C.C. Chang. Controlling access in tree hierarchies. Information Sciences, 78:69-76, 1994.
    • (1994) Information Sciences , vol.78 , pp. 69-76
    • Wu, T.C.1    Chang, C.C.2
  • 17
    • 0029210438 scopus 로고
    • A cryptographic implementation for dynamic access control in a user hierarchy
    • H.M. Tsai and C.C. Chang. A cryptographic implementation for dynamic access control in a user hierarchy. Computers and Security, 14:159-166, 1995.
    • (1995) Computers and Security , vol.14 , pp. 159-166
    • Tsai, H.M.1    Chang, C.C.2
  • 18
    • 0029292250 scopus 로고
    • Dynamic access control scheme based on the chinese remainder theorem
    • T.C. Wu, T.S. Wu, and W.H. He. Dynamic access control scheme based on the chinese remainder theorem. Computer Systems Science and Engineering, (2):92-99, 1995.
    • (1995) Computer Systems Science and Engineering , vol.2 , pp. 92-99
    • Wu, T.C.1    Wu, T.S.2    He, W.H.3
  • 19
    • 0031344109 scopus 로고    scopus 로고
    • Dynamic key management schemes for access control in a hierarchy
    • C.H. Lin. Dynamic key management schemes for access control in a hierarchy. Computer Communications, 29:1381-1385, 1997.
    • (1997) Computer Communications , vol.29 , pp. 1381-1385
    • Lin, C.H.1
  • 22
    • 0032638189 scopus 로고    scopus 로고
    • Comments on 'dynamic key management schemes for access control in a hierarchy'
    • N.Y. Lee and T. Hwang. Comments on 'dynamic key management schemes for access control in a hierarchy'. Computer Communications, 22:87-89, 1999.
    • (1999) Computer Communications , vol.22 , pp. 87-89
    • Lee, N.Y.1    Hwang, T.2
  • 23
    • 84956999112 scopus 로고    scopus 로고
    • Chinese remainder theorem based hierarchical access control for secure group communication
    • ICICS '01
    • X. Zou, B. Ramamurthy, and S.S. Magliveras. Chinese remainder theorem based hierarchical access control for secure group communication. In ICICS '01, volume 2229 of Lecture Notes in Computer Science, pages 381-385, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2229 , pp. 381-385
    • Zou, X.1    Ramamurthy, B.2    Magliveras, S.S.3
  • 24
    • 0036222059 scopus 로고    scopus 로고
    • A novel key management scheme based on discrete logarithms and polynomial interpolations
    • V.R.L. Shen, T.S. Chen, and F. Lai. A novel key management scheme based on discrete logarithms and polynomial interpolations. Computers and Security, 21(2):164-171, 2002.
    • (2002) Computers and Security , vol.21 , Issue.2 , pp. 164-171
    • Shen, V.R.L.1    Chen, T.S.2    Lai, F.3
  • 25
    • 85029434541 scopus 로고
    • Sibling intractable function families and their applications
    • Advances in Cryptology - Proceedings of Asiacrypt '91
    • Y. Zheng, T. Hardjono, and J. Pieprzvk. Sibling intractable function families and their applications. In Advances in Cryptology - Proceedings of Asiacrypt '91, volume 739 of Lecture Notes in Computer Science, pages 124-138, 1992.
    • (1992) Lecture Notes in Computer Science , vol.739 , pp. 124-138
    • Zheng, Y.1    Hardjono, T.2    Pieprzvk, J.3
  • 27
    • 85028838274 scopus 로고
    • On the cryptopgrahic applications of random functions
    • Advances in Cryptology - Proceedings of CRYPTO 84
    • O. Goldreich, S. Goldwasser and S. Micali. On the cryptopgrahic applications of random functions. In Advances in Cryptology - Proceedings of CRYPTO 84, volume 196 of Lecture Notes in Computer Science, pages 276-288, 1985.
    • (1985) Lecture Notes in Computer Science , vol.196 , pp. 276-288
    • Goldreich, O.1    Goldwasser, S.2    Micali, S.3
  • 29
    • 84990731886 scopus 로고
    • How to prove yourself: Practical solutions to identification and signature problems
    • Advances in Cryptology - Proceedings of CRYPTO 86, Springer-Verlag
    • A. Fiat and A. Shamir. How to prove yourself: practical solutions to identification and signature problems. In Advances in Cryptology - Proceedings of CRYPTO 86, volume 263 of Lecture Notes in Computer Science, pages 186-194, Springer-Verlag, 1987.
    • (1987) Lecture Notes in Computer Science , vol.263 , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 31
    • 0003195066 scopus 로고
    • The MD5 message-digest algorithm
    • R. Rivest. The MD5 message-digest algorithm. RFC 1321, 1992.
    • (1992) RFC , vol.1321
    • Rivest, R.1
  • 32
    • 0003629991 scopus 로고
    • Federal information Processing Standards Publication 180-1
    • Federal information Processing Standards Publication 180-1. Secure hash standard, 1995.
    • (1995) Secure hash standard


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.