메뉴 건너뛰기




Volumn 67, Issue 2, 2003, Pages 99-107

Controlling access in large partially ordered hierarchies using cryptographic keys

Author keywords

Access control; Cryptography; Data security; Hierarchy; Key management

Indexed keywords

COMPUTATIONAL METHODS; COMPUTER NETWORKS; COMPUTER OPERATING SYSTEMS; DATABASE SYSTEMS; PROBLEM SOLVING; SECURITY OF DATA;

EID: 0038053203     PISSN: 01641212     EISSN: None     Source Type: Journal    
DOI: 10.1016/S0164-1212(02)00091-2     Document Type: Article
Times cited : (41)

References (30)
  • 1
    • 84976752387 scopus 로고
    • Cryptographic solution to a problem of access control in a hierarchy
    • Akl S.G., Taylor P.D. Cryptographic solution to a problem of access control in a hierarchy. ACM Transactions on Computer Systems. 1(3):1983;239-248.
    • (1983) ACM Transactions on Computer Systems , vol.1 , Issue.3 , pp. 239-248
    • Akl, S.G.1    Taylor, P.D.2
  • 2
    • 0003400251 scopus 로고
    • Secure computer systems: Unified exposition and multics interpretation
    • Hanscom Air Force Base Technical Report, Beford, MA
    • Bell, D., LaPadula, L., 1975. Secure computer systems: Unified exposition and multics interpretation. Technical Report ESD-TR-75-306, Hanscom Air Force Base Technical Report, Beford, MA.
    • (1975) Technical Report , vol.ESD-TR-75-306
    • Bell, D.1    LaPadula, L.2
  • 3
    • 0001692137 scopus 로고
    • Cryptographic key assignment scheme for access control in a hierarchy
    • Chang C.C., Hwang R.J., Wu T.C. Cryptographic key assignment scheme for access control in a hierarchy. Information Systems. 17(3):1992;243-247.
    • (1992) Information Systems , vol.17 , Issue.3 , pp. 243-247
    • Chang, C.C.1    Hwang, R.J.2    Wu, T.C.3
  • 4
    • 0030192262 scopus 로고    scopus 로고
    • Parallel computation of the generating keys for RSA cryptosystems
    • Chang C.-C., Hwang M.-S. Parallel computation of the generating keys for RSA cryptosystems. IEE Electronics Letters. 32(15):1996;1365-1366.
    • (1996) IEE Electronics Letters , vol.32 , Issue.15 , pp. 1365-1366
    • Chang, C.-C.1    Hwang, M.-S.2
  • 6
    • 0008538346 scopus 로고
    • A further weakness in the common modulus protocol for the RSA cryptosystem
    • DeLaurentis J.M. A further weakness in the common modulus protocol for the RSA cryptosystem. Cryptologia. 8(3):1984;253-259.
    • (1984) Cryptologia , vol.8 , Issue.3 , pp. 253-259
    • DeLaurentis, J.M.1
  • 10
    • 0020778471 scopus 로고
    • Scomp: A solution to the multilevel security problem
    • Fraim L.J. Scomp: A solution to the multilevel security problem. IEEE Computer. 1983;26-34.
    • (1983) IEEE Computer , pp. 26-34
    • Fraim, L.J.1
  • 11
    • 0000954459 scopus 로고
    • A cryptographic key generation scheme for multilevel data security
    • Harn L., Lin H.Y. A cryptographic key generation scheme for multilevel data security. Computers and Security. 9(6):1990;539-546.
    • (1990) Computers and Security , vol.9 , Issue.6 , pp. 539-546
    • Harn, L.1    Lin, H.Y.2
  • 12
    • 0031194544 scopus 로고    scopus 로고
    • A cryptographic key assignment scheme in a hierarchy for access control
    • Hwang M.-S. A cryptographic key assignment scheme in a hierarchy for access control. Mathematical and Computer Modelling. 26(2):1997;27-31.
    • (1997) Mathematical and Computer Modelling , vol.26 , Issue.2 , pp. 27-31
    • Hwang, M.-S.1
  • 13
    • 0032663530 scopus 로고    scopus 로고
    • Extension of CHW cryptographic key assignment scheme in a hierarchy
    • Hwang M.-S. Extension of CHW cryptographic key assignment scheme in a hierarchy. IEE Proceedings Computers and Digital Techniques. 146(4):1999;219.
    • (1999) IEE Proceedings Computers and Digital Techniques , vol.146 , Issue.4 , pp. 219
    • Hwang, M.-S.1
  • 14
    • 0012922503 scopus 로고    scopus 로고
    • An improvement of a dynamic cryptographic key assignment schemes in a tree hierarchy
    • Hwang M.-S. An improvement of a dynamic cryptographic key assignment schemes in a tree hierarchy. Computers and Mathematics with Applications. 37(3):1999;19-22.
    • (1999) Computers and Mathematics with Applications , vol.37 , Issue.3 , pp. 19-22
    • Hwang, M.-S.1
  • 15
    • 0033751899 scopus 로고    scopus 로고
    • An asymmetric cryptographic scheme for a totally-ordered hierarchy
    • Hwang M.-S. An asymmetric cryptographic scheme for a totally-ordered hierarchy. International Journal of Computer Mathematics. 73:2000;463-468.
    • (2000) International Journal of Computer Mathematics , vol.73 , pp. 463-468
    • Hwang, M.-S.1
  • 16
    • 0033908596 scopus 로고    scopus 로고
    • Cryptanalysis of YCN key assignment scheme in a hierarchy
    • Hwang M.-S. Cryptanalysis of YCN key assignment scheme in a hierarchy. Information Processing Letters. 73(3):2000;97-101.
    • (2000) Information Processing Letters , vol.73 , Issue.3 , pp. 97-101
    • Hwang, M.-S.1
  • 17
  • 18
    • 0038564821 scopus 로고    scopus 로고
    • Cryptanalysis of the batch verifying multiple RSA digital signatures
    • Hwang M.-S., Lin I.-C., Hwang K.-F. Cryptanalysis of the batch verifying multiple RSA digital signatures. Informatica. 11(1):2000;15-19.
    • (2000) Informatica , vol.11 , Issue.1 , pp. 15-19
    • Hwang, M.-S.1    Lin, I.-C.2    Hwang, K.-F.3
  • 19
    • 0005695222 scopus 로고
    • An optimal algorithm to assign cryptographic keys in a tree structure for access control
    • Liaw H.-T., Lei C.-L. An optimal algorithm to assign cryptographic keys in a tree structure for access control. BIT. 33:1993;46-56.
    • (1993) BIT , vol.33 , pp. 46-56
    • Liaw, H.-T.1    Lei, C.-L.2
  • 21
    • 0023861378 scopus 로고
    • A model for multilevel security in computer networks
    • New Orleans, LA
    • Lu, W.P., Sundareshan, M.K., 1988. A model for multilevel security in computer networks. In: Proceedings of the 1988 INFOCOM, New Orleans, LA, pp. 1095-1104.
    • (1988) Proceedings of the 1988 INFOCOM , pp. 1095-1104
    • Lu, W.P.1    Sundareshan, M.K.2
  • 22
    • 0026853767 scopus 로고
    • Enhanced protocols for hierarchical encryption key management for secure communication in internet environments
    • Lu W.P., Sundareshan M.K. Enhanced protocols for hierarchical encryption key management for secure communication in internet environments. IEEE Transactions on Communications. 40(4):1992;658-660.
    • (1992) IEEE Transactions on Communications , vol.40 , Issue.4 , pp. 658-660
    • Lu, W.P.1    Sundareshan, M.K.2
  • 23
    • 0022115074 scopus 로고
    • An optimal algorithm for assigning cryptographic keys to control access in a hierarchy
    • Mackinnon S.J., Taylor P.D., Meijer H., Akl S.G. An optimal algorithm for assigning cryptographic keys to control access in a hierarchy. IEEE Transactions on Computers. 34(9):1985;797-802.
    • (1985) IEEE Transactions on Computers , vol.34 , Issue.9 , pp. 797-802
    • Mackinnon, S.J.1    Taylor, P.D.2    Meijer, H.3    Akl, S.G.4
  • 25
    • 0022582820 scopus 로고
    • A security policy and formal top level specification for a multi-level secure local area network
    • Oakland
    • McHugh, J., Moore, A.P., 1986. A security policy and formal top level specification for a multi-level secure local area network. In: Proceedings of the 1986 IEEE Symposium on Security and Privacy, Oakland, pp. 34-39.
    • (1986) Proceedings of the 1986 IEEE Symposium on Security and Privacy , pp. 34-39
    • McHugh, J.1    Moore, A.P.2
  • 27
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public key cryptosystems
    • Rivest R.L., Shamir A., Adleman L. A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM. 21(2):1978;120-126.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 28
    • 0023962708 scopus 로고
    • Cryptographic implementation of a tree hierarchy for access control
    • Sandhu R.S. Cryptographic implementation of a tree hierarchy for access control. Information Processing Letters. 27:1988;95-98.
    • (1988) Information Processing Letters , vol.27 , pp. 95-98
    • Sandhu, R.S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.