메뉴 건너뛰기




Volumn 26, Issue 3, 2004, Pages 159-166

A new cryptographic key assignment scheme with time-constraint access control in a hierarchy

Author keywords

Access control; Cryptographic key assignment; Secure broadcasting

Indexed keywords

COMPUTER NETWORKS; DATA PRIVACY; DATA TRANSFER; SECURITY OF DATA;

EID: 0742285808     PISSN: 09205489     EISSN: None     Source Type: Journal    
DOI: 10.1016/S0920-5489(03)00073-4     Document Type: Article
Times cited : (37)

References (10)
  • 1
    • 84976752387 scopus 로고
    • Cryptographic solution to a problem of access control in a hierarchy
    • Akl S.G., Taylor P.D. Cryptographic solution to a problem of access control in a hierarchy. ACM Transactions on Computer Systems. 1(3):1983;239-248.
    • (1983) ACM Transactions on Computer Systems , vol.1 , Issue.3 , pp. 239-248
    • Akl, S.G.1    Taylor, P.D.2
  • 2
    • 0022115074 scopus 로고
    • An optimal algorithm for assigning cryptographic keys to control access in a hierarchy
    • Mackinnon S.J., Taylor P.D., Heijer H., Akl S.G. An optimal algorithm for assigning cryptographic keys to control access in a hierarchy. IEEE Transactions on Computers. 34(9):1985;797-802.
    • (1985) IEEE Transactions on Computers , vol.34 , Issue.9 , pp. 797-802
    • Mackinnon, S.J.1    Taylor, P.D.2    Heijer, H.3    Akl, S.G.4
  • 3
    • 0023962708 scopus 로고
    • Cryptographic implementation of a tree hierarchy for access control
    • Sandhu R.S. Cryptographic implementation of a tree hierarchy for access control. Information Processing Letters. 27:1988;95-98.
    • (1988) Information Processing Letters , vol.27 , pp. 95-98
    • Sandhu, R.S.1
  • 4
    • 0000954459 scopus 로고
    • A cryptographic key generation scheme for multilevel data security
    • Harn L., Lin H.Y. A cryptographic key generation scheme for multilevel data security. Computers and Security. 9(6):1990;539-546.
    • (1990) Computers and Security , vol.9 , Issue.6 , pp. 539-546
    • Harn, L.1    Lin, H.Y.2
  • 5
    • 0001692137 scopus 로고
    • Cryptographic key assignment scheme for access control in a hierarchy
    • Chang C.C., Hwang R.J., Wu T.C. Cryptographic key assignment scheme for access control in a hierarchy. Information Systems. 17(3):1992;243-247.
    • (1992) Information Systems , vol.17 , Issue.3 , pp. 243-247
    • Chang, C.C.1    Hwang, R.J.2    Wu, T.C.3
  • 6
    • 0030104563 scopus 로고    scopus 로고
    • Crypto backup and key escrow
    • Maher D.P. Crypto backup and key escrow. Communications of the ACM. 39(3):1996;48-53.
    • (1996) Communications of the ACM , vol.39 , Issue.3 , pp. 48-53
    • Maher, D.P.1
  • 8
    • 0036187601 scopus 로고    scopus 로고
    • A time-bound cryptographic key assignment scheme for access control in a hierarchy
    • Jan/Feb
    • Tzeng W.G. A time-bound cryptographic key assignment scheme for access control in a hierarchy. IEEE Transactions on Knowledge and Data Engineering. 14(1):Jan/Feb 2002;182-188.
    • (2002) IEEE Transactions on Knowledge and Data Engineering , vol.14 , Issue.1 , pp. 182-188
    • Tzeng, W.G.1
  • 9
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • February
    • Rivest R.L., Shamir A., Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM. 21(2):February 1978;120-126.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 10
    • 0742293405 scopus 로고    scopus 로고
    • Security of Tzeng's time-bound key assignment scheme for access control in a hierarchy
    • Yi X. Security of Tzeng's time-bound key assignment scheme for access control in a hierarchy. to appear in IEEE Transactions on Knowledge and Data Engineering. 2002.
    • (2002) IEEE Transactions on Knowledge and Data Engineering
    • Yi, X.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.