메뉴 건너뛰기




Volumn , Issue , 2005, Pages 74-83

Key management for multi-user encrypted databases

Author keywords

Encrypted indexing databases; Hierarchical key derivation schema; Selective access

Indexed keywords

ENCRYPTED/INDEXING DATABASES; HIERARCHICAL KEY DERIVATION SCHEMA; SELECTIVE ACCESS;

EID: 33244469997     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1103780.1103792     Document Type: Conference Paper
Times cited : (76)

References (25)
  • 2
    • 84976752387 scopus 로고
    • Cryptographic solution to a problem of access control in a hierarchy
    • August
    • S. Akl and P. Taylor. Cryptographic solution to a problem of access control in a hierarchy. ACM Transactions on Computer System, 1(3):239-248, August 1983.
    • (1983) ACM Transactions on Computer System , vol.1 , Issue.3 , pp. 239-248
    • Akl, S.1    Taylor, P.2
  • 4
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • D. Boneh and M. Franklin. Identity-based encryption from the weil pairing. In Proc. CRYPTO 01, pages 213-229, 2001.
    • (2001) Proc. CRYPTO 01 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 15
    • 84901649420 scopus 로고    scopus 로고
    • Ensuring the integrity of encrypted databases in the database-as-a- service model
    • H. Hacigümüs, B. Iyer, and S. Mehrotra. Ensuring the integrity of encrypted databases in the database-as-a-service model. In DBSec, pages 61-74, 2003.
    • (2003) DBSec , pp. 61-74
    • Hacigümüs, H.1    Iyer, B.2    Mehrotra, S.3
  • 17
    • 0036361105 scopus 로고    scopus 로고
    • Executing SQL over encrypted data in the database-service-provider model
    • Madison, WI, USA, June
    • H. Hacigümüs, B. Iyer, S. Mehrotra, and C. Li. Executing SQL over encrypted data in the database-service-provider model. In Proc. of the ACM SIGMOD'2002, Madison, WI, USA, June 2002.
    • (2002) Proc. of the ACM SIGMOD'2002
    • Hacigümüs, H.1    Iyer, B.2    Mehrotra, S.3    Li, C.4
  • 18
    • 84858540250 scopus 로고    scopus 로고
    • Performance-conscious key management in encrypted databases
    • H. Hacigümüs and S. Mehrotra. Performance-conscious key management in encrypted databases. In DBSec, pages 95-109, 2004.
    • (2004) DBSec , pp. 95-109
    • Hacigümüs, H.1    Mehrotra, S.2
  • 19
    • 0000954459 scopus 로고
    • A cryptographic key generation scheme for multilevel data security
    • October
    • L. Harn and H. Lin. A cryptographic key generation scheme for multilevel data security. Computers and Security, 9(6):539-546, October 1990.
    • (1990) Computers and Security , vol.9 , Issue.6 , pp. 539-546
    • Harn, L.1    Lin, H.2
  • 21
    • 0038053203 scopus 로고    scopus 로고
    • Controlling access in large partially ordered hierarchies using cryptographic keys
    • July
    • M. Hwang and W. Yang. Controlling access in large partially ordered hierarchies using cryptographic keys. The Journal of Systems and Software, 67(2):99-107, July 2003.
    • (2003) The Journal of Systems and Software , vol.67 , Issue.2 , pp. 99-107
    • Hwang, M.1    Yang, W.2
  • 22
    • 0022115074 scopus 로고
    • An optimal algorithm for assigning cryptographic keys to control access in a hierarchy
    • September
    • S. MacKinnon, P.Taylor, H. Meijer, and S.Akl. An optimal algorithm for assigning cryptographic keys to control access in a hierarchy. IEEE Transactions on Computers, 34(9):797-802, September 1985.
    • (1985) IEEE Transactions on Computers , vol.34 , Issue.9 , pp. 797-802
    • MacKinnon, S.1    Taylor, P.2    Meijer, H.3    Akl, S.4
  • 24
    • 0023962708 scopus 로고
    • Cryptographic implementation of a tree hierarchy for access control
    • April
    • R. Sandhu. Cryptographic implementation of a tree hierarchy for access control. Information Processing Letters. 27(2):95-98, April 1988.
    • (1988) Information Processing Letters , vol.27 , Issue.2 , pp. 95-98
    • Sandhu, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.