메뉴 건너뛰기




Volumn , Issue , 2002, Pages 65-73

A cryptographic solution to implement access control in a hierarchy and more

Author keywords

Access control; Cryptography; Hierarchy

Indexed keywords

ALGORITHMS; DATA STRUCTURES; GRAPH THEORY; INFORMATION MANAGEMENT;

EID: 0242456749     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/507721.507723     Document Type: Conference Paper
Times cited : (63)

References (23)
  • 1
    • 0020931264 scopus 로고
    • Cryptographic solution to a multilevel security problem
    • In D. Chaum, R. L. Rivest, and A. T. Sherman, editors; Plenum Press, NY, August
    • S. G. Akl and P. D. Taylor. Cryptographic Solution to a Multilevel Security Problem. In D. Chaum, R. L. Rivest, and A. T. Sherman, editors, Advances in Cryptology: Proceedings of CRYPTO '82, pages 237-249. Plenum Press, NY, August 1982.
    • (1982) Advances in Cryptology: Proceedings of CRYPTO '82 , pp. 237-249
    • Akl, S.G.1    Taylor, P.D.2
  • 2
    • 84976752387 scopus 로고
    • Cryptographic solution to a problem of access control in a hierarchy
    • S. G. Akl and P. D. Taylor. Cryptographic Solution to a Problem of Access Control in a Hierarchy. ACM Transactions on Computer Systems, 1(3):239-248, 1983.
    • (1983) ACM Transactions on Computer Systems , vol.1 , Issue.3 , pp. 239-248
    • Akl, S.G.1    Taylor, P.D.2
  • 5
    • 0003683288 scopus 로고
    • High-speed RSA implementation
    • Technical Report TR 201, RSA Laboratories, RSA Data Security, Inc., Nov.
    • Ç. Koç. High-Speed RSA Implementation. Technical Report TR 201, RSA Laboratories, RSA Data Security, Inc., Nov. 1994.
    • (1994)
    • Koç, Ç.1
  • 7
    • 0242528839 scopus 로고
    • Discretionary access control in structurally object-oriented database systems
    • Elsevier Science, North Holland
    • K. R. Dittrich, M. Hartig, and H. Pfefferle. Discretionary Access Control in Structurally Object-Oriented Database Systems. In Database Security II: Status and Prospects, IFIP, pages 105-121. Elsevier Science, North Holland, 1989.
    • (1989) Database Security II: Status and Prospects, IFIP , pp. 105-121
    • Dittrich, K.R.1    Hartig, M.2    Pfefferle, H.3
  • 9
    • 0000954459 scopus 로고
    • A cryptographic key generation scheme for multi-level data security
    • L. Harn and H. Y. Lin. A Cryptographic Key Generation Scheme for Multi-level Data Security. Computer & Security, 9(6):539-546, 1990.
    • (1990) Computer & Security , vol.9 , Issue.6 , pp. 539-546
    • Harn, L.1    Lin, H.Y.2
  • 10
    • 0242445290 scopus 로고
    • The secure use of RSA
    • B. Kaliski and M. Robshaw. The Secure Use of RSA. CryptoBytes, 1(3):7-13, 1995.
    • (1995) CryptoBytes , vol.1 , Issue.3 , pp. 7-13
    • Kaliski, B.1    Robshaw, M.2
  • 12
    • 0022115074 scopus 로고
    • An optimal algorithm for assigning cryptographic keys to access control in a hierarchy
    • S. J. MacKinnon, P. D. Taylor, H. Meijer, and S. G. Akl. An Optimal Algorithm for Assigning Cryptographic Keys to Access Control in a Hierarchy. IEEE Transactions on Computers, C-34(9):797-802, 1985.
    • (1985) IEEE Transactions on Computers , vol.C-34 , Issue.9 , pp. 797-802
    • MacKinnon, S.J.1    Taylor, P.D.2    Meijer, H.3    Akl, S.G.4
  • 15
    • 0242613535 scopus 로고
    • Information security policy
    • In M. D. Abrams, S. Jajodia, and H. J. Podell, editors; IEEE Computer Society Press
    • I. M. Olson and M. D. Abrams. Information Security Policy. In M. D. Abrams, S. Jajodia, and H. J. Podell, editors, Information Security: An Integrated Collection of Essays, pages 160-169. IEEE Computer Society Press, 1995.
    • (1995) Information Security: An Integrated Collection of Essays , pp. 160-169
    • Olson, I.M.1    Abrams, M.D.2
  • 17
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R. L. Rivest, A. Shamir, and L. Adleman. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, 21(2):627-647, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 637-647
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 18
    • 0023962708 scopus 로고
    • Cryptographic implementation of a tree hierarchy for access control
    • R. S. Sandhu. Cryptographic Implementation of a Tree Hierarchy for Access Control. Information Processing Letters, 27(2):95-98, 1988.
    • (1988) Information Processing Letters , vol.27 , Issue.2 , pp. 95-98
    • Sandhu, R.S.1
  • 23
    • 4243480270 scopus 로고
    • New solutions to the problem of access control in a hierarchy
    • Technical Report Preprint 93-2, Department of Computer Science, University of Wollongong, February
    • Y. Zheng, T. Hardjono, and J. Seberry. New Solutions to the Problem of Access Control in a Hierarchy. Technical Report Preprint 93-2, Department of Computer Science, University of Wollongong, February 1993, Available from http://citeseer.nj.com/28503.html.
    • (1993)
    • Zheng, Y.1    Hardjono, T.2    Seberry, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.