메뉴 건너뛰기




Volumn 1, Issue , 2004, Pages 396-401

A novel key management scheme for dynamic access control in a user hierarchy

Author keywords

Access Control; And User hierarchy; Cryptographic Key Assignment; One Way Hash Function

Indexed keywords

ACCESS CONTROL; CRYPTOGRAPHIC KEY ASSIGNMENT; ONE-WAY HASH FUNCTION; USER HIERARCHY;

EID: 18744363342     PISSN: 07303157     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/COMPSAC.2005.147     Document Type: Conference Paper
Times cited : (23)

References (20)
  • 1
    • 84976752387 scopus 로고
    • Cryptographic solution to a problem of access control in a hierarchy
    • Akl S. G., and Taylor P. D., 1983, Cryptographic Solution to a Problem of Access Control in a Hierarchy, "ACM Transactions on Computer System, "3(1), pp. 239-247.
    • (1983) ACM Transactions on Computer System , vol.3 , Issue.1 , pp. 239-247
    • Akl, S.G.1    Taylor, P.D.2
  • 2
    • 38249003211 scopus 로고
    • Access control in a hierarchy using a one-way trapdoor function
    • Chang C. C., and Buehrer D. J., 1993, Access control in a Hierarchy Using a One-way Trapdoor Function, "Computers and Mathematics with Applications, " 26(5), pp. 71-76.
    • (1993) Computers and Mathematics with Applications , vol.26 , Issue.5 , pp. 71-76
    • Chang, C.C.1    Buehrer, D.J.2
  • 3
    • 0001692137 scopus 로고
    • A cryptographic key assignment scheme for access control in a hierarchy
    • Chang C. C., Hwang, R. J., and Wu T. C., 1992, A Cryptographic Key Assignment Scheme for Access Control in a Hierarchy, "Information Systems," 17(3), pp. 243-247.
    • (1992) Information Systems , vol.17 , Issue.3 , pp. 243-247
    • Chang, C.C.1    Hwang, R.J.2    Wu, T.C.3
  • 4
    • 84894043862 scopus 로고
    • Flexible access control with master keys
    • Springer-Verlag
    • Chick G. C., and Tavares S. E., 1990, Flexible Access Control with Master Keys, "In Advances in Cryptology - CRYPTO'89," Springer-Verlag, pp. 316-322.
    • (1990) Advances in Cryptology - CRYPTO'89 , pp. 316-322
    • Chick, G.C.1    Tavares, S.E.2
  • 8
    • 0020778471 scopus 로고
    • A solution to multilevel security problem
    • Fraim L. J., 1983, A Solution to Multilevel Security Problem, "IEEE Computer," pp. 26-143.
    • (1983) IEEE Computer , pp. 26-143
    • Fraim, L.J.1
  • 9
    • 0000954459 scopus 로고
    • A cryptographic key generation scheme for multilevel data security
    • Harn L., and Lin H. Y., 1990, A Cryptographic Key Generation Scheme for Multilevel Data Security, "Computers & Security," Vol. 9, pp. 539-546.
    • (1990) Computers & Security , vol.9 , pp. 539-546
    • Harn, L.1    Lin, H.Y.2
  • 11
    • 0022115074 scopus 로고
    • An optimal algorithm for assigning cryptographic keys to control access in a hierarchy
    • MacKinnon S. T., Taylor P. D., Meijer H., and Akl S. G., 1985, An Optimal Algorithm for Assigning Cryptographic Keys to Control Access in a Hierarchy, "IEEE Transactions on Computers," 24(9), pp. 797-802.
    • (1985) IEEE Transactions on Computers , vol.24 , Issue.9 , pp. 797-802
    • MacKinnon, S.T.1    Taylor, P.D.2    Meijer, H.3    Akl, S.G.4
  • 12
    • 0023231848 scopus 로고
    • Specifications for multilevel security and a hook-up property
    • Oakland, CA
    • McCullough D., 1987, Specifications for Multilevel Security and a Hook-up Property, Proc. 1987, "IEEE Symp. on Security and Privacy," Oakland, CA, 161-166.
    • (1987) Proc. 1987, "IEEE Symp. on Security and Privacy" , pp. 161-166
    • McCullough, D.1
  • 13
    • 84920472394 scopus 로고
    • A security policy and formal top level specification for a multilevel secure local area network
    • Oakland, CA
    • McHugh J., and Moore A. P., 1986, A Security Policy and Formal Top Level Specification for a Multilevel Secure Local Area Network, Proc. 1986, "IEEE on Security and Privacy," Oakland, CA, pp. 34-39.
    • (1986) Proc. 1986, "IEEE on Security and Privacy" , pp. 34-39
    • McHugh, J.1    Moore, A.P.2
  • 15
    • 0023962708 scopus 로고
    • Cryptographic implementation of a tree hierarchy for access control
    • Sandhu R. S., 1988, Cryptographic Implementation of a Tree Hierarchy for Access Control, "Information Processing Letter," Vol. 27, pp. 95-98.
    • (1988) Information Processing Letter , vol.27 , pp. 95-98
    • Sandhu, R.S.1
  • 16
    • 0029210438 scopus 로고
    • A cryptographic implementation for dynamic access control in a user hierarchy
    • Tsai H. M., and Chang C. C., 1995, A Cryptographic Implementation for Dynamic Access Control in a User Hierarchy, "Computers and Security," 14(2), pp. 857-959.
    • (1995) Computers and Security , vol.14 , Issue.2 , pp. 857-959
    • Tsai, H.M.1    Chang, C.C.2
  • 19
    • 0031344109 scopus 로고    scopus 로고
    • Dynamic key management schemes for access control in a hierarchy
    • Dec. 15
    • Lin, C.H., Dynamic Key Management Schemes for Access Control in a Hierarchy, "Computer Communications," Vol. 20, 15, Dec. 15, 1997, pp. 1381-1385.
    • (1997) Computer Communications , vol.20 , Issue.15 , pp. 1381-1385
    • Lin, C.H.1
  • 20
    • 0033334588 scopus 로고    scopus 로고
    • Cryptographic key assignment scheme for dynamic access control in a user hierarchy
    • Sept.
    • Kuo, F.H., Shen, V.R.L., Chen, T.S., and Lai, F, Cryptographic Key Assignment Scheme for Dynamic Access Control in a User Hierarchy, "IEE Proc. Computers & Digital Techniques," Vol. 146, No.5, Sept. 1999, pp. 235-240.
    • (1999) IEE Proc. Computers & Digital Techniques , vol.146 , Issue.5 , pp. 235-240
    • Kuo, F.H.1    Shen, V.R.L.2    Chen, T.S.3    Lai, F.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.