메뉴 건너뛰기




Volumn 162, Issue 1, 2005, Pages 339-351

A novel key management scheme for dynamic access control in a user hierarchy

Author keywords

Access control; Cryptographic key assignment; One way hash function; User hierarchy

Indexed keywords

ALGORITHMS; COMPUTER NETWORKS; DATA HANDLING; FUNCTION EVALUATION; PROBLEM SOLVING; SECURITY OF DATA; SET THEORY;

EID: 10444280844     PISSN: 00963003     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.amc.2003.12.113     Document Type: Article
Times cited : (30)

References (24)
  • 1
    • 84976752387 scopus 로고
    • Cryptographic solution to a problem of access control in a hierarchy
    • S.G. Akl, P.D. Taylor, Cryptographic solution to a problem of access control in a hierarchy, ACM Transactions on Computer System 3 (1) (1983) 239-247.
    • (1983) ACM Transactions on Computer System , vol.3 , Issue.1 , pp. 239-247
    • Akl, S.G.1    Taylor, P.D.2
  • 2
  • 3
    • 0001692137 scopus 로고
    • A cryptographic key assignment scheme for access control in a hierarchy
    • C.C. Chang, R.J. Hwang, T.C. Wu, A cryptographic key assignment scheme for access control in a hierarchy, Information Systems 17 (3) (1992) 243-247.
    • (1992) Information Systems , vol.17 , Issue.3 , pp. 243-247
    • Chang, C.C.1    Hwang, R.J.2    Wu, T.C.3
  • 4
    • 84894043862 scopus 로고
    • Flexible access control with master keys
    • Springer-Verlag, NY
    • G.C. Chick, S.E. Tavares, Flexible access control with master keys, in: Advances in Cryptology - CRYPTO '89, Springer-Verlag, NY, 1990, pp. 316-322.
    • (1990) Advances in Cryptology - CRYPTO '89 , pp. 316-322
    • Chick, G.C.1    Tavares, S.E.2
  • 8
    • 0021138526 scopus 로고
    • Cryptographic checksums for multilevel database security
    • Oakland, CA
    • D.E. Denning, Cryptographic checksums for multilevel database security, in: Proceedings of 1984 IEEE on Security and Privacy, Oakland, CA, 1984, pp. 52-61.
    • (1984) Proceedings of 1984 IEEE on Security and Privacy , pp. 52-61
    • Denning, D.E.1
  • 9
    • 0020778471 scopus 로고
    • A solution to multilevel security problem
    • L.J. Fraim, A solution to multilevel security problem, IEEE Computer (1983) 26-143.
    • (1983) IEEE Computer , pp. 26-143
    • Fraim, L.J.1
  • 10
    • 0000954459 scopus 로고
    • A cryptographic key generation scheme for multilevel data security
    • L. Harn, H.Y. Lin, A cryptographic key generation scheme for multilevel data security, Computers & Security 9 (1990) 539-546.
    • (1990) Computers & Security , vol.9 , pp. 539-546
    • Harn, L.1    Lin, H.Y.2
  • 12
    • 0004676563 scopus 로고
    • A branch oriented key management solution to dynamic access control in a hierarchy
    • C.S. Laih, T.L. Hwang, A branch oriented key management solution to dynamic access control in a hierarchy, IEEE Transactions on Software Engineering (1991) 422-429.
    • (1991) IEEE Transactions on Software Engineering , pp. 422-429
    • Laih, C.S.1    Hwang, T.L.2
  • 13
    • 0022115074 scopus 로고
    • An optimal algorithm for assigning cryptographic keys to control access in a hierarchy
    • S.T. MacKinnon, P.D. Taylor, H. Meijer, S.G. Akl, An optimal algorithm for assigning cryptographic keys to control access in a hierarchy, IEEE Transactions on Computers 24 (9) (1985) 797-802.
    • (1985) IEEE Transactions on Computers , vol.24 , Issue.9 , pp. 797-802
    • MacKinnon, S.T.1    Taylor, P.D.2    Meijer, H.3    Akl, S.G.4
  • 15
    • 84920472394 scopus 로고
    • A security policy and formal top level specification for a multilevel secure local area network
    • Oakland, CA
    • J. McHugh, A.P. Moore, A security policy and formal top level specification for a multilevel secure local area network, in: Proceedings of 1986, IEEE on Security and Privacy, Oakland, CA, 1986, pp. 34-39.
    • (1986) Proceedings of 1986, IEEE on Security and Privacy , pp. 34-39
    • McHugh, J.1    Moore, A.P.2
  • 16
    • 0003614758 scopus 로고
    • Digitalized signatures and public-key function as intractable as factorization
    • IT Lab. Compt. Si
    • M.O. Rabin, Digitalized Signatures and Public-Key Function as Intractable as Factorization, Technical Report," IT/LCS/TR-212, IT Lab. Compt. Si. 1979.
    • (1979) Technical Report , vol.IT-LCS-TR-212
    • Rabin, M.O.1
  • 18
    • 0023962708 scopus 로고
    • Cryptographic implementation of a tree hierarchy for access control
    • R.S. Sandhu, Cryptographic implementation of a tree hierarchy for access control, Information Processing Letter 27 (1988) 95-98.
    • (1988) Information Processing Letter , vol.27 , pp. 95-98
    • Sandhu, R.S.1
  • 19
    • 0029210438 scopus 로고
    • A cryptographic implementation for dynamic access control in a user hierarchy
    • H.M. Tsai, C.C. Chang, A cryptographic implementation for dynamic access control in a user hierarchy, Computers and Security 14 (2) (1995) 857-959.
    • (1995) Computers and Security , vol.14 , Issue.2 , pp. 857-959
    • Tsai, H.M.1    Chang, C.C.2
  • 21
    • 0029292250 scopus 로고
    • Dynamic access control scheme based on the Chinese remainder theorem
    • T.C. Wu, T.S. Wu, W.H. He, Dynamic access control scheme based on the Chinese remainder theorem, Computer Systems Science and Engineering 10 (2) (1995) 92-99.
    • (1995) Computer Systems Science and Engineering , vol.10 , Issue.2 , pp. 92-99
    • Wu, T.C.1    Wu, T.S.2    He, W.H.3
  • 23
    • 0031344109 scopus 로고    scopus 로고
    • Dynamic key management schemes for access control in a hierarchy
    • C.H. Lin, Dynamic key management schemes for access control in a hierarchy, Computer Communications 20 (1997) 1381-1385.
    • (1997) Computer Communications , vol.20 , pp. 1381-1385
    • Lin, C.H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.