메뉴 건너뛰기




Volumn , Issue , 2005, Pages 285-286

An RSA-based time-bound hierarchical key assignment scheme for electronic article subscription

Author keywords

Access Control; Key Assignment

Indexed keywords

COMPUTER SCIENCE; DATA ACQUISITION; INFORMATION RETRIEVAL; KNOWLEDGE ENGINEERING; PROBLEM SOLVING; SECURITY OF DATA; SECURITY SYSTEMS;

EID: 33745780944     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1099554.1099629     Document Type: Conference Paper
Times cited : (30)

References (9)
  • 1
    • 84976752387 scopus 로고
    • Cryptographic solution to a problem of access control in a hierarchy
    • S. Akl and P. Taylor. Cryptographic solution to a problem of access control in a hierarchy. ACM Trans. on Computer Systems, 1:239-248, 1983.
    • (1983) ACM Trans. on Computer Systems , vol.1 , pp. 239-248
    • Akl, S.1    Taylor, P.2
  • 2
    • 13844281059 scopus 로고    scopus 로고
    • Efficient time-bound hierarchical key assignment scheme
    • H. Chien. Efficient time-bound hierarchical key assignment scheme. IEEE Trans. of Knowledge & Data Engineering, 16(10):1301-1304, 2004.
    • (2004) IEEE Trans. of Knowledge & Data Engineering , vol.16 , Issue.10 , pp. 1301-1304
    • Chien, H.1
  • 3
    • 0141972441 scopus 로고    scopus 로고
    • New hierarchical assignment without public key cryptography
    • H. Chien and J. Jan. New hierarchical assignment without public key cryptography. Computers & Security, 22:523-526, 2003.
    • (2003) Computers & Security , vol.22 , pp. 523-526
    • Chien, H.1    Jan, J.2
  • 4
    • 0000954459 scopus 로고
    • A cryptographic key generation scheme for multilevel data security
    • L. Harn and H. Lin. A cryptographic key generation scheme for multilevel data security. Computers & Security, 9:539-546, 1990
    • (1990) Computers & Security , vol.9 , pp. 539-546
    • Harn, L.1    Lin, H.2
  • 5
    • 0023962708 scopus 로고
    • Cryptographic implementation of a tree hierarchy for access control
    • R. Sandhu. Cryptographic implementation of a tree hierarchy for access control. Info. Processing Letters, 27:95-98, 1988.
    • (1988) Info. Processing Letters , vol.27 , pp. 95-98
    • Sandhu, R.1
  • 7
    • 0036187601 scopus 로고    scopus 로고
    • A time-bound cryptographic key assignment scheme for access control in a hierarchy
    • W. Tzeng. A time-bound cryptographic key assignment scheme for access control in a hierarchy. IEEE Trans. on Knowledge & Data Engineering, 14:182-188, 2002.
    • (2002) IEEE Trans. on Knowledge & Data Engineering , vol.14 , pp. 182-188
    • Tzeng, W.1
  • 9
    • 0041347682 scopus 로고    scopus 로고
    • Security of tzeng's time-bound cryptographic key assignment scheme for access control in a hierarchy
    • X. Yi and Y. Ye. Security of tzeng's time-bound cryptographic key assignment scheme for access control in a hierarchy. IEEE Trans. on Knowledge & Data Engineering, 15:1054-1055, 2003.
    • (2003) IEEE Trans. on Knowledge & Data Engineering , vol.15 , pp. 1054-1055
    • Yi, X.1    Ye, Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.