-
1
-
-
84976752387
-
Cryptographic solution to a problem of access control in a hierarchy
-
September
-
S. Akl and P. Taylor. Cryptographic solution to a problem of access control in a hierarchy. ACM Transactions on Computer Systems, 1(3):239-248, September 1983.
-
(1983)
ACM Transactions on Computer Systems
, vol.1
, Issue.3
, pp. 239-248
-
-
Akl, S.1
Taylor, P.2
-
3
-
-
84957018842
-
Low cost attacks on tamper resistant devices
-
In Security Protocols Workshop, April
-
R. Anderson and M. Kuhn. Low cost attacks on tamper resistant devices. In Security Protocols Workshop, volume 1361 of LNCS, pages 125-136, April 1997.
-
(1997)
LNCS
, vol.1361
, pp. 125-136
-
-
Anderson, R.1
Kuhn, M.2
-
4
-
-
0003400251
-
Secure computer systems: Mathematical foundations
-
MITRE Corporation, March
-
D. Bell and L. LaPadula. Secure computer systems: Mathematical foundations. Technical Report MTR-2547, MITRE Corporation, March 1973.
-
(1973)
Technical Report
, vol.MTR-2547
-
-
Bell, D.1
Lapadula, L.2
-
6
-
-
38249003211
-
Access control in a hierarchy using a one-way trapdoor function
-
C. Chang and D. Buehrer. Access control in a hierarchy using a one-way trapdoor function. Computers and Mathematics with Applications, 26(5):71-76, 1993.
-
(1993)
Computers and Mathematics with Applications
, vol.26
, Issue.5
, pp. 71-76
-
-
Chang, C.1
Buehrer, D.2
-
7
-
-
3042595322
-
A key assignment scheme for controlling access in partially ordered user hierarchies
-
C. Chang, I. Lin, H. Tsai, H. Wang, and T. Taichung. A key assignment scheme for controlling access in partially ordered user hierarchies. In International Conference on Advanced Information Networking and Application (AINA '04), 2004.
-
(2004)
International Conference on Advanced Information Networking and Application (AINA '04)
-
-
Chang, C.1
Lin, I.2
Tsai, H.3
Wang, H.4
Taichung, T.5
-
8
-
-
0036396975
-
Hierarchical access control based on Chinese remainder theorem and symmetric algorithm
-
T. Chen and Y Chung. Hierarchical access control based on Chinese remainder theorem and symmetric algorithm. Computers & Security, 2002.
-
(2002)
Computers & Security
-
-
Chen, T.1
Chung, Y.2
-
10
-
-
84894043862
-
Flexible access control with master keys
-
In Advances in Cryptology -CRYPTO'89
-
G. Chick and S. Tavares. Flexible access control with master keys. In Advances in Cryptology -CRYPTO'89, volume 435 of LNCS, pages 316-322, 1990.
-
(1990)
LNCS
, vol.435
, pp. 316-322
-
-
Chick, G.1
Tavares, S.2
-
11
-
-
0141972441
-
New hierarchical assignment without public key cryptography
-
H. Chien and J. Jan. New hierarchical assignment without public key cryptography. Computers & Security, 22(6):523-526, 2003.
-
(2003)
Computers & Security
, vol.22
, Issue.6
, pp. 523-526
-
-
Chien, H.1
Jan, J.2
-
12
-
-
33845458354
-
A novel hierarchical key management scheme based on quadratic residues
-
December
-
J. Chou, C. Lin, and T. Lee. A novel hierarchical key management scheme based on quadratic residues. In Internation Symposium on Parallel and Distributed Processing and Applications (ISPA'04), volume 3358, pages 858-865, December 2004.
-
(2004)
Internation Symposium on Parallel and Distributed Processing and Applications (ISPA'04)
, vol.3358
, pp. 858-865
-
-
Chou, J.1
Lin, C.2
Lee, T.3
-
14
-
-
33745792230
-
Hierarchical key management scheme using polynomial interpolation
-
January
-
M. Das, A. Saxena, V. Gulati, and D. Phatak. Hierarchical key management scheme using polynomial interpolation. ACM SIGOPS Operating Systems Review, 39(1):40-47, January 2005.
-
(2005)
ACM SIGOPS Operating Systems Review
, vol.39
, Issue.1
, pp. 40-47
-
-
Das, M.1
Saxena, A.2
Gulati, V.3
Phatak, D.4
-
15
-
-
0022583299
-
Views for multilevel database security
-
April
-
D. Denning, S. Akl, M. Morgenstern, and P. Neumann. Views for multilevel database security. In IEEE Symposium on Security and Privacy, pages 156-172, April 1986.
-
(1986)
IEEE Symposium on Security and Privacy
, pp. 156-172
-
-
Denning, D.1
Akl, S.2
Morgenstern, M.3
Neumann, P.4
-
18
-
-
0020778471
-
Scomp: A solution to multilevel security problem
-
July
-
L. Fraim. Scomp: a solution to multilevel security problem. IEEE Computer, 16(7):126-143, July 1983.
-
(1983)
IEEE Computer
, vol.16
, Issue.7
, pp. 126-143
-
-
Fraim, L.1
-
21
-
-
84990664534
-
Linear time algorithms for visibility and shortest path problems inside simple polygons
-
L. Guibas, J. Hershberger, D. Leven, M. Sharir, and R. Tarjan. Linear time algorithms for visibility and shortest path problems inside simple polygons. In Annual ACM Symposium on Computational Geometry, pages 1-13, 1986.
-
(1986)
Annual ACM Symposium on Computational Geometry
, pp. 1-13
-
-
Guibas, L.1
Hershberger, J.2
Leven, D.3
Sharir, M.4
Tarjan, R.5
-
22
-
-
0000954459
-
A cryptographic key generation scheme for multilevel data security
-
October
-
L. Harn and H. Lin. A cryptographic key generation scheme for multilevel data security. Computers & Security, 9(6):539-546, October 1990.
-
(1990)
Computers & Security
, vol.9
, Issue.6
, pp. 539-546
-
-
Lin, H.1
-
23
-
-
1642488872
-
Access key distribution scheme for level-based hierarchy
-
August
-
M. He, P. Fan, F. Kaderali, and D. Yuan. Access key distribution scheme for level-based hierarchy. In International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT'03), pages 942-945, August 2003.
-
(2003)
International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT'03)
, pp. 942-945
-
-
He, M.1
Fan, P.2
Kaderali, F.3
Yuan, D.4
-
24
-
-
0742285808
-
A new cryptographic key assignment scheme with time-constraint access control in a hierarchy
-
H. Huang and C. Chang. A new cryptographic key assignment scheme with time-constraint access control in a hierarchy. Computer Standards & Interfaces, 26:159-166, 2004.
-
(2004)
Computer Standards & Interfaces
, vol.26
, pp. 159-166
-
-
Huang, H.1
Chang, C.2
-
25
-
-
0032689879
-
An improvement of novel cryptographic key assignment scheme for dynamic access control in a hierarchy
-
March
-
M. Hwang. An improvement of novel cryptographic key assignment scheme for dynamic access control in a hierarchy. IEICE Trans. Fundamentals, E82-A(2):548-550, March 1999.
-
(1999)
IEICE Trans. Fundamentals
, vol.E82-A
, Issue.2
, pp. 548-550
-
-
Hwang, M.1
-
26
-
-
0000370732
-
A new dynamic key generation scheme for access control in a hierarchy
-
Winter
-
M. Hwang. A new dynamic key generation scheme for access control in a hierarchy. Nordic Journal of Computing, 6(4):363-371, Winter 1999.
-
(1999)
Nordic Journal of Computing
, vol.6
, Issue.4
, pp. 363-371
-
-
Hwang, M.1
-
27
-
-
0038053203
-
Controlling access in large partially ordered hierarchies using cryptographic keys
-
August
-
M. Hwang and W. Yang. Controlling access in large partially ordered hierarchies using cryptographic keys. Journal of Systems and Software, 67(2):99-107, August 2003.
-
(2003)
Journal of Systems and Software
, vol.67
, Issue.2
, pp. 99-107
-
-
Hwang, M.1
Yang, W.2
-
28
-
-
0000811402
-
-
Sorting and Searching, Addison-Wesley
-
D. Knuth. Sorting and Searching, volume 3 of The Art of Computer Programming. Addison-Wesley, 1973.
-
(1973)
The Art of Computer Programming
, vol.3
-
-
Knuth, D.1
-
29
-
-
0005719902
-
A dynamic cryptographic key assignment scheme in a tree structure
-
H. Liaw, S. Wang, and C. Lei. A dynamic cryptographic key assignment scheme in a tree structure. Computers and Mathematics with Applications, 25(6):109-114, 1993.
-
(1993)
Computers and Mathematics with Applications
, vol.25
, Issue.6
, pp. 109-114
-
-
Liaw, H.1
Wang, S.2
Lei, C.3
-
30
-
-
0035149664
-
Hierarchical key assignment without public-key cryptography
-
C. Lin. Hierarchical key assignment without public-key cryptography. Computers & Security, 20(7):612-619, 2001.
-
(2001)
Computers & Security
, vol.20
, Issue.7
, pp. 612-619
-
-
Lin, C.1
-
31
-
-
0344089052
-
A new key assignment scheme for enforcing complicated access control policies in hierarchy
-
I. Lin, M. Hwang, and C. Chang. A new key assignment scheme for enforcing complicated access control policies in hierarchy. Future Generation Computer Systems, 19(4):457-462, 2003.
-
(2003)
Future Generation Computer Systems
, vol.19
, Issue.4
, pp. 457-462
-
-
Lin, I.1
Hwang, M.2
Chang, C.3
-
33
-
-
0023861378
-
A moredle for multilevel security in computer networks
-
W. Lu and M. Sundareshan. A moredle for multilevel security in computer networks. In INFOCOM'88, pages 1095-1104, 1988.
-
(1988)
INFOCOM'88
, pp. 1095-1104
-
-
Lu, W.1
Sundareshan, M.2
-
34
-
-
0022115074
-
An optimal algorithm for assigning cryptographic keys to control access in a hierarchy
-
September
-
S. MacKinnon, P. Taylor, H. Meijer, and S. Akl. An optimal algorithm for assigning cryptographic keys to control access in a hierarchy. IEEE Transactions on Computers, 34(9):797-802, September 1985.
-
(1985)
IEEE Transactions on Computers
, vol.34
, Issue.9
, pp. 797-802
-
-
MacKinnon, S.1
Taylor, P.2
Meijer, H.3
Akl, S.4
-
36
-
-
0022582820
-
A security policy and formal top level specification for a multi-level secure local area network
-
J. McHugh and A. Moore. A security policy and formal top level specification for a multi-level secure local area network. In IEEE Symposium on Security and Privacy, pages 34-49, 1986.
-
(1986)
IEEE Symposium on Security and Privacy
, pp. 34-49
-
-
McHugh, J.1
Moore, A.2
-
41
-
-
0030086382
-
Role-based access control models
-
R. Sandhu, E. Coyne, H. Feinstein, and C. Youman. Role-based access control models. IEEE Computer, 29(2):38-47, 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
42
-
-
0023962708
-
Cryptographic implementation of a tree hierarchy for access control
-
January
-
R.S. Sandhu. Cryptographic implementation of a tree hierarchy for access control. Information Processing Letters, 27(2):95-98, January 1988.
-
(1988)
Information Processing Letters
, vol.27
, Issue.2
, pp. 95-98
-
-
Sandhu, R.S.1
-
43
-
-
5744237343
-
Cryptographic key assignment schemes for any access control policy
-
November
-
A. De Santis, A. Ferrara, and B. Masucci. Cryptographic key assignment schemes for any access control policy. Information Processing Letters (IPL), 92(4):199-205, November 2004.
-
(2004)
Information Processing Letters (IPL)
, vol.92
, Issue.4
, pp. 199-205
-
-
De Santis, A.1
Ferrara, A.2
Masucci, B.3
-
44
-
-
0036222059
-
A novel key management scheme based on discrete logarithms and polynomial interpolations
-
V. Shen and T. Chen. A novel key management scheme based on discrete logarithms and polynomial interpolations. Computers & Security, 21(2):164-171, 2002.
-
(2002)
Computers & Security
, vol.21
, Issue.2
, pp. 164-171
-
-
Shen, V.1
Chen, T.2
-
45
-
-
8344221947
-
Scalable hierarchical access control in secure group communication
-
Y. Sun and K. Liu. Scalable hierarchical access control in secure group communication. In IEEE INFOCOM 2004, 2004.
-
(2004)
IEEE INFOCOM 2004
-
-
Sun, Y.1
Liu, K.2
-
46
-
-
0029210438
-
A cryptographic implementation for dynamic access control in a user hierarchy
-
H. Tsai and C. Chang. A cryptographic implementation for dynamic access control in a user hierarchy. Computers & Security, 14(2):159-166, 1995.
-
(1995)
Computers & Security
, vol.14
, Issue.2
, pp. 159-166
-
-
Tsai, H.1
Chang, C.2
-
47
-
-
0036187601
-
A time-bound cryptographic key assignment scheme for access control in a hierarchy
-
W. Tzeng. A time-bound cryptographic key assignment scheme for access control in a hierarchy. IEEE Transactions on Knowledge and Data Engineering, 14(1):182-188, 2002.
-
(2002)
IEEE Transactions on Knowledge and Data Engineering
, vol.14
, Issue.1
, pp. 182-188
-
-
Tzeng, W.1
-
48
-
-
84858914204
-
An access control scheme for partially ordered set hierarchy with provable security
-
J. Wu and R. Wei. An access control scheme for partially ordered set hierarchy with provable security. Cryptology ePrint Archive, Report 2004/295, 2004. texttthttp://eprint.iacr.org/.
-
(2004)
Cryptology EPrint Archive, Report
, vol.2004
, Issue.295
-
-
Wu, J.1
Wei, R.2
-
53
-
-
4243480270
-
New solutions to the problem of access control in a hierarchy
-
Y. Zheng, T. Hardjono, and J. Seberry. New solutions to the problem of access control in a hierarchy. Technical report, 1993.
-
(1993)
Technical Report
-
-
Zheng, Y.1
Hardjono, T.2
Seberry, J.3
-
54
-
-
0036920852
-
A practical key management scheme for access control in a user hierarchy
-
S. Zhong. A practical key management scheme for access control in a user hierarchy. Computers & Security, 21(8):750-759, 2002.
-
(2002)
Computers & Security
, vol.21
, Issue.8
, pp. 750-759
-
-
Zhong, S.1
|