메뉴 건너뛰기




Volumn , Issue , 2005, Pages 190-202

Dynamic and efficient key management for access hierarchies

Author keywords

Efficient key derivation; Hierarchical access control; Key management

Indexed keywords

EFFICIENT KEY DERIVATION; HIERARCHICAL ACCESS CONTROL; KEY MANAGEMENT;

EID: 33745793594     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1102120.1102147     Document Type: Conference Paper
Times cited : (165)

References (54)
  • 1
    • 84976752387 scopus 로고
    • Cryptographic solution to a problem of access control in a hierarchy
    • September
    • S. Akl and P. Taylor. Cryptographic solution to a problem of access control in a hierarchy. ACM Transactions on Computer Systems, 1(3):239-248, September 1983.
    • (1983) ACM Transactions on Computer Systems , vol.1 , Issue.3 , pp. 239-248
    • Akl, S.1    Taylor, P.2
  • 3
    • 84957018842 scopus 로고    scopus 로고
    • Low cost attacks on tamper resistant devices
    • In Security Protocols Workshop, April
    • R. Anderson and M. Kuhn. Low cost attacks on tamper resistant devices. In Security Protocols Workshop, volume 1361 of LNCS, pages 125-136, April 1997.
    • (1997) LNCS , vol.1361 , pp. 125-136
    • Anderson, R.1    Kuhn, M.2
  • 4
    • 0003400251 scopus 로고
    • Secure computer systems: Mathematical foundations
    • MITRE Corporation, March
    • D. Bell and L. LaPadula. Secure computer systems: Mathematical foundations. Technical Report MTR-2547, MITRE Corporation, March 1973.
    • (1973) Technical Report , vol.MTR-2547
    • Bell, D.1    Lapadula, L.2
  • 6
    • 38249003211 scopus 로고
    • Access control in a hierarchy using a one-way trapdoor function
    • C. Chang and D. Buehrer. Access control in a hierarchy using a one-way trapdoor function. Computers and Mathematics with Applications, 26(5):71-76, 1993.
    • (1993) Computers and Mathematics with Applications , vol.26 , Issue.5 , pp. 71-76
    • Chang, C.1    Buehrer, D.2
  • 8
    • 0036396975 scopus 로고    scopus 로고
    • Hierarchical access control based on Chinese remainder theorem and symmetric algorithm
    • T. Chen and Y Chung. Hierarchical access control based on Chinese remainder theorem and symmetric algorithm. Computers & Security, 2002.
    • (2002) Computers & Security
    • Chen, T.1    Chung, Y.2
  • 10
    • 84894043862 scopus 로고
    • Flexible access control with master keys
    • In Advances in Cryptology -CRYPTO'89
    • G. Chick and S. Tavares. Flexible access control with master keys. In Advances in Cryptology -CRYPTO'89, volume 435 of LNCS, pages 316-322, 1990.
    • (1990) LNCS , vol.435 , pp. 316-322
    • Chick, G.1    Tavares, S.2
  • 11
    • 0141972441 scopus 로고    scopus 로고
    • New hierarchical assignment without public key cryptography
    • H. Chien and J. Jan. New hierarchical assignment without public key cryptography. Computers & Security, 22(6):523-526, 2003.
    • (2003) Computers & Security , vol.22 , Issue.6 , pp. 523-526
    • Chien, H.1    Jan, J.2
  • 14
    • 33745792230 scopus 로고    scopus 로고
    • Hierarchical key management scheme using polynomial interpolation
    • January
    • M. Das, A. Saxena, V. Gulati, and D. Phatak. Hierarchical key management scheme using polynomial interpolation. ACM SIGOPS Operating Systems Review, 39(1):40-47, January 2005.
    • (2005) ACM SIGOPS Operating Systems Review , vol.39 , Issue.1 , pp. 40-47
    • Das, M.1    Saxena, A.2    Gulati, V.3    Phatak, D.4
  • 18
    • 0020778471 scopus 로고
    • Scomp: A solution to multilevel security problem
    • July
    • L. Fraim. Scomp: a solution to multilevel security problem. IEEE Computer, 16(7):126-143, July 1983.
    • (1983) IEEE Computer , vol.16 , Issue.7 , pp. 126-143
    • Fraim, L.1
  • 22
    • 0000954459 scopus 로고
    • A cryptographic key generation scheme for multilevel data security
    • October
    • L. Harn and H. Lin. A cryptographic key generation scheme for multilevel data security. Computers & Security, 9(6):539-546, October 1990.
    • (1990) Computers & Security , vol.9 , Issue.6 , pp. 539-546
    • Lin, H.1
  • 24
    • 0742285808 scopus 로고    scopus 로고
    • A new cryptographic key assignment scheme with time-constraint access control in a hierarchy
    • H. Huang and C. Chang. A new cryptographic key assignment scheme with time-constraint access control in a hierarchy. Computer Standards & Interfaces, 26:159-166, 2004.
    • (2004) Computer Standards & Interfaces , vol.26 , pp. 159-166
    • Huang, H.1    Chang, C.2
  • 25
    • 0032689879 scopus 로고    scopus 로고
    • An improvement of novel cryptographic key assignment scheme for dynamic access control in a hierarchy
    • March
    • M. Hwang. An improvement of novel cryptographic key assignment scheme for dynamic access control in a hierarchy. IEICE Trans. Fundamentals, E82-A(2):548-550, March 1999.
    • (1999) IEICE Trans. Fundamentals , vol.E82-A , Issue.2 , pp. 548-550
    • Hwang, M.1
  • 26
    • 0000370732 scopus 로고    scopus 로고
    • A new dynamic key generation scheme for access control in a hierarchy
    • Winter
    • M. Hwang. A new dynamic key generation scheme for access control in a hierarchy. Nordic Journal of Computing, 6(4):363-371, Winter 1999.
    • (1999) Nordic Journal of Computing , vol.6 , Issue.4 , pp. 363-371
    • Hwang, M.1
  • 27
    • 0038053203 scopus 로고    scopus 로고
    • Controlling access in large partially ordered hierarchies using cryptographic keys
    • August
    • M. Hwang and W. Yang. Controlling access in large partially ordered hierarchies using cryptographic keys. Journal of Systems and Software, 67(2):99-107, August 2003.
    • (2003) Journal of Systems and Software , vol.67 , Issue.2 , pp. 99-107
    • Hwang, M.1    Yang, W.2
  • 28
  • 29
    • 0005719902 scopus 로고
    • A dynamic cryptographic key assignment scheme in a tree structure
    • H. Liaw, S. Wang, and C. Lei. A dynamic cryptographic key assignment scheme in a tree structure. Computers and Mathematics with Applications, 25(6):109-114, 1993.
    • (1993) Computers and Mathematics with Applications , vol.25 , Issue.6 , pp. 109-114
    • Liaw, H.1    Wang, S.2    Lei, C.3
  • 30
    • 0035149664 scopus 로고    scopus 로고
    • Hierarchical key assignment without public-key cryptography
    • C. Lin. Hierarchical key assignment without public-key cryptography. Computers & Security, 20(7):612-619, 2001.
    • (2001) Computers & Security , vol.20 , Issue.7 , pp. 612-619
    • Lin, C.1
  • 31
    • 0344089052 scopus 로고    scopus 로고
    • A new key assignment scheme for enforcing complicated access control policies in hierarchy
    • I. Lin, M. Hwang, and C. Chang. A new key assignment scheme for enforcing complicated access control policies in hierarchy. Future Generation Computer Systems, 19(4):457-462, 2003.
    • (2003) Future Generation Computer Systems , vol.19 , Issue.4 , pp. 457-462
    • Lin, I.1    Hwang, M.2    Chang, C.3
  • 33
    • 0023861378 scopus 로고
    • A moredle for multilevel security in computer networks
    • W. Lu and M. Sundareshan. A moredle for multilevel security in computer networks. In INFOCOM'88, pages 1095-1104, 1988.
    • (1988) INFOCOM'88 , pp. 1095-1104
    • Lu, W.1    Sundareshan, M.2
  • 34
    • 0022115074 scopus 로고
    • An optimal algorithm for assigning cryptographic keys to control access in a hierarchy
    • September
    • S. MacKinnon, P. Taylor, H. Meijer, and S. Akl. An optimal algorithm for assigning cryptographic keys to control access in a hierarchy. IEEE Transactions on Computers, 34(9):797-802, September 1985.
    • (1985) IEEE Transactions on Computers , vol.34 , Issue.9 , pp. 797-802
    • MacKinnon, S.1    Taylor, P.2    Meijer, H.3    Akl, S.4
  • 36
    • 0022582820 scopus 로고
    • A security policy and formal top level specification for a multi-level secure local area network
    • J. McHugh and A. Moore. A security policy and formal top level specification for a multi-level secure local area network. In IEEE Symposium on Security and Privacy, pages 34-49, 1986.
    • (1986) IEEE Symposium on Security and Privacy , pp. 34-49
    • McHugh, J.1    Moore, A.2
  • 42
    • 0023962708 scopus 로고
    • Cryptographic implementation of a tree hierarchy for access control
    • January
    • R.S. Sandhu. Cryptographic implementation of a tree hierarchy for access control. Information Processing Letters, 27(2):95-98, January 1988.
    • (1988) Information Processing Letters , vol.27 , Issue.2 , pp. 95-98
    • Sandhu, R.S.1
  • 43
    • 5744237343 scopus 로고    scopus 로고
    • Cryptographic key assignment schemes for any access control policy
    • November
    • A. De Santis, A. Ferrara, and B. Masucci. Cryptographic key assignment schemes for any access control policy. Information Processing Letters (IPL), 92(4):199-205, November 2004.
    • (2004) Information Processing Letters (IPL) , vol.92 , Issue.4 , pp. 199-205
    • De Santis, A.1    Ferrara, A.2    Masucci, B.3
  • 44
    • 0036222059 scopus 로고    scopus 로고
    • A novel key management scheme based on discrete logarithms and polynomial interpolations
    • V. Shen and T. Chen. A novel key management scheme based on discrete logarithms and polynomial interpolations. Computers & Security, 21(2):164-171, 2002.
    • (2002) Computers & Security , vol.21 , Issue.2 , pp. 164-171
    • Shen, V.1    Chen, T.2
  • 45
    • 8344221947 scopus 로고    scopus 로고
    • Scalable hierarchical access control in secure group communication
    • Y. Sun and K. Liu. Scalable hierarchical access control in secure group communication. In IEEE INFOCOM 2004, 2004.
    • (2004) IEEE INFOCOM 2004
    • Sun, Y.1    Liu, K.2
  • 46
    • 0029210438 scopus 로고
    • A cryptographic implementation for dynamic access control in a user hierarchy
    • H. Tsai and C. Chang. A cryptographic implementation for dynamic access control in a user hierarchy. Computers & Security, 14(2):159-166, 1995.
    • (1995) Computers & Security , vol.14 , Issue.2 , pp. 159-166
    • Tsai, H.1    Chang, C.2
  • 47
    • 0036187601 scopus 로고    scopus 로고
    • A time-bound cryptographic key assignment scheme for access control in a hierarchy
    • W. Tzeng. A time-bound cryptographic key assignment scheme for access control in a hierarchy. IEEE Transactions on Knowledge and Data Engineering, 14(1):182-188, 2002.
    • (2002) IEEE Transactions on Knowledge and Data Engineering , vol.14 , Issue.1 , pp. 182-188
    • Tzeng, W.1
  • 48
    • 84858914204 scopus 로고    scopus 로고
    • An access control scheme for partially ordered set hierarchy with provable security
    • J. Wu and R. Wei. An access control scheme for partially ordered set hierarchy with provable security. Cryptology ePrint Archive, Report 2004/295, 2004. texttthttp://eprint.iacr.org/.
    • (2004) Cryptology EPrint Archive, Report , vol.2004 , Issue.295
    • Wu, J.1    Wei, R.2
  • 53
    • 4243480270 scopus 로고
    • New solutions to the problem of access control in a hierarchy
    • Y. Zheng, T. Hardjono, and J. Seberry. New solutions to the problem of access control in a hierarchy. Technical report, 1993.
    • (1993) Technical Report
    • Zheng, Y.1    Hardjono, T.2    Seberry, J.3
  • 54
    • 0036920852 scopus 로고    scopus 로고
    • A practical key management scheme for access control in a user hierarchy
    • S. Zhong. A practical key management scheme for access control in a user hierarchy. Computers & Security, 21(8):750-759, 2002.
    • (2002) Computers & Security , vol.21 , Issue.8 , pp. 750-759
    • Zhong, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.