메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 384-394

Exploiting hierarchical identity-based encryption for access control to pervasive computing information

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL; ACCESS RIGHTS; CONTEXT SENSITIVE CONSTRAINTS; IDENTITY-BASED ENCRYPTION;

EID: 33745470377     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SECURECOMM.2005.18     Document Type: Conference Paper
Times cited : (34)

References (18)
  • 1
    • 84976752387 scopus 로고
    • Cryptographic Solution to a Problem of Access Control in a Hierarchy
    • S. G. Akl and P. D. Taylor. Cryptographic Solution to a Problem of Access Control in a Hierarchy. ACM Transactions on Computer Systems, 1(3):293-248, 1983.
    • (1983) ACM Transactions on Computer Systems , vol.1 , Issue.3 , pp. 293-248
    • Akl, S.G.1    Taylor, P.D.2
  • 3
    • 0037623983 scopus 로고    scopus 로고
    • Identity-Based Encryption from the Weil Pairing
    • D. Boneh and M. Franklin. Identity-Based Encryption from the Weil Pairing. SIAM J. of Computing, 32(3):586-615, 2003.
    • (2003) SIAM J. of Computing , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 4
    • 33847248404 scopus 로고    scopus 로고
    • Extended Abstract in Proceedings of Crypto 2001, pp. 213-229, 2001.
    • Extended Abstract in Proceedings of Crypto 2001, pp. 213-229, 2001.
  • 9
    • 33847316039 scopus 로고    scopus 로고
    • S. A. C. Group. IBE Secure E-mail, http://crypto.stanford.edu/ibe.
    • S. A. C. Group. IBE Secure E-mail, http://crypto.stanford.edu/ibe.
  • 10
    • 0000954459 scopus 로고
    • A Cryptographic Key Generation Scheme for Multi-level Data Security
    • L. Harn and H. Y. Lin. A Cryptographic Key Generation Scheme for Multi-level Data Security. Computer & Security, 9(6):539-546, 1990.
    • (1990) Computer & Security , vol.9 , Issue.6 , pp. 539-546
    • Harn, L.1    Lin, H.Y.2
  • 11
    • 33847326702 scopus 로고    scopus 로고
    • U. Hengartner and P. Steenkiste. Exploiting Hierarchical Identity-Based Encryption for Access Control to Pervasive Computing Information. Technical Report CMU-CS-04-172, Computer Science Department, Carnegie Mellon University, October 2004.
    • U. Hengartner and P. Steenkiste. Exploiting Hierarchical Identity-Based Encryption for Access Control to Pervasive Computing Information. Technical Report CMU-CS-04-172, Computer Science Department, Carnegie Mellon University, October 2004.
  • 14
    • 33847265770 scopus 로고    scopus 로고
    • S. S. Ltd. Multiprecision Integer and Rational Arithmetic C/C++ Library (MIRACL). http://indigo.ie/~mscott/.
    • S. S. Ltd. Multiprecision Integer and Rational Arithmetic C/C++ Library (MIRACL). http://indigo.ie/~mscott/.
  • 16
    • 0023962708 scopus 로고
    • Cryptographic Implementation of a Tree Hierarchy for Access Control
    • R. S. Sandhu. Cryptographic Implementation of a Tree Hierarchy for Access Control. Information Processing Letters, 27(2):95-98, 1988.
    • (1988) Information Processing Letters , vol.27 , Issue.2 , pp. 95-98
    • Sandhu, R.S.1
  • 18
    • 0038148412 scopus 로고    scopus 로고
    • A Unified Scheme for Resource Protection in Automated Trust Negotiation
    • May
    • T. Yu and M. Winslett. A Unified Scheme for Resource Protection in Automated Trust Negotiation. In Proceedings of IEEE Symposium on Security and Privacy, pages 110-122, May 2003.
    • (2003) Proceedings of IEEE Symposium on Security and Privacy , pp. 110-122
    • Yu, T.1    Winslett, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.