-
1
-
-
84976752387
-
Cryptographic solution to a problem of access control in a hierarchy
-
S. Akl and P. Taylor. Cryptographic solution to a problem of access control in a hierarchy. ACM Transactions on Computer Systems, 1(3):239-248, 1983.
-
(1983)
ACM Transactions on Computer Systems
, vol.1
, Issue.3
, pp. 239-248
-
-
Akl, S.1
Taylor, P.2
-
3
-
-
0003400251
-
Secure computer systems: Unified exposition and Multics interpretation
-
Technical Report MTR-2997, Mitre Corporation, Bedford, Massachusetts
-
D. Bell and L. LaPadula. Secure computer systems: Unified exposition and Multics interpretation. Technical Report MTR-2997, Mitre Corporation, Bedford, Massachusetts, 1976.
-
(1976)
-
-
Bell, D.1
LaPadula, L.2
-
4
-
-
0001692137
-
Cryptographic key assignment scheme for access control in a hierarchy
-
C.-C. Chang, R.-J. Hwang, and T.-C. Wu. Cryptographic key assignment scheme for access control in a hierarchy. Information Systems, 17(3):243-247, 1992.
-
(1992)
Information Systems
, vol.17
, Issue.3
, pp. 243-247
-
-
Chang, C.-C.1
Hwang, R.-J.2
Wu, T.-C.3
-
5
-
-
0036396975
-
Hierarchical access control based on Chinese Remainder Theorem and symmetric algorithm
-
T.-S. Chen and Y.-F. Chung. Hierarchical access control based on Chinese Remainder Theorem and symmetric algorithm. Computers & Security, 21(6):565-570, 2002.
-
(2002)
Computers & Security
, vol.21
, Issue.6
, pp. 565-570
-
-
Chen, T.-S.1
Chung, Y.-F.2
-
6
-
-
10444280844
-
A novel key management scheme for dynamic access control in a user hierarchy
-
T.-S. Chen and J.-Y. Huang. A novel key management scheme for dynamic access control in a user hierarchy. Applied Mathematics and Computation, 162:339-351, 2005.
-
(2005)
Applied Mathematics and Computation
, vol.162
, pp. 339-351
-
-
Chen, T.-S.1
Huang, J.-Y.2
-
7
-
-
4944263232
-
Modified cryptographic key assignment scheme for overcoming the incorrectness of the CHW scheme
-
T.-S. Chen, K.-H. Huang, and Y.-F. Chung. Modified cryptographic key assignment scheme for overcoming the incorrectness of the CHW scheme. Applied Mathematics and Computation, 159:147-155, 2004.
-
(2004)
Applied Mathematics and Computation
, vol.159
, pp. 147-155
-
-
Chen, T.-S.1
Huang, K.-H.2
Chung, Y.-F.3
-
8
-
-
0345529101
-
Efficient key assignment scheme for mobile agent systems
-
W.-M. Chew, C.-H. Chi, and T.-Y. Li. Efficient key assignment scheme for mobile agent systems. In Proceedings of the 15th International Conference, on Tools with Artificial Intelligence (ICTAI'03), pages 338-345, 2003.
-
(2003)
Proceedings of the 15th International Conference, on Tools with Artificial Intelligence (ICTAI'03)
, pp. 338-345
-
-
Chew, W.-M.1
Chi, C.-H.2
Li, T.-Y.3
-
9
-
-
84894043862
-
Flexible access control with master keys
-
Advances in Cryptology, CRYPTO'89, of, Springer-Verlag
-
G. Chick and S. Tavares. Flexible access control with master keys. In Advances in Cryptology - CRYPTO'89, volume 435 of Lecture Notes in Computer Science, pages 316-322. Springer-Verlag, 1990.
-
(1990)
Lecture Notes in Computer Science
, vol.435
, pp. 316-322
-
-
Chick, G.1
Tavares, S.2
-
10
-
-
13844281059
-
Efficient time-bound hierarchical key assignment scheme
-
H.-Y. Chien. Efficient time-bound hierarchical key assignment scheme. IEEE Transactions on Knowledge and Data Engineering, 16(10):1301-1304, 2004.
-
(2004)
IEEE Transactions on Knowledge and Data Engineering
, vol.16
, Issue.10
, pp. 1301-1304
-
-
Chien, H.-Y.1
-
11
-
-
0141972441
-
New hierarchical assignment without public key cryptography
-
H.-Y. Chien and J.-K. Jan. New hierarchical assignment without public key cryptography. Computers & Security, 22(6):523-526, 2003.
-
(2003)
Computers & Security
, vol.22
, Issue.6
, pp. 523-526
-
-
Chien, H.-Y.1
Jan, J.-K.2
-
15
-
-
0016949746
-
A lattice model of secure information flow
-
D. Denning. A lattice model of secure information flow. Communications of the ACM, 19(5):236-243, 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.1
-
16
-
-
0004218585
-
-
Cambridge University Press, Cambridge, United Kingdom
-
K. Engel. Sperner Theory. Cambridge University Press, Cambridge, United Kingdom, 1997.
-
(1997)
Sperner Theory
-
-
Engel, K.1
-
17
-
-
0142156584
-
An information-theoretic approach to the access control problem
-
C. Blundo and C. Laneve, editors, ICTCS 2003, of, Springer-Verlag
-
A. Ferrara and B. Masucci. An information-theoretic approach to the access control problem. In C. Blundo and C. Laneve, editors, ICTCS 2003, volume 2841 of Lecture Notes in Computer Science, pages 342-354. Springer-Verlag, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2841
, pp. 342-354
-
-
Ferrara, A.1
Masucci, B.2
-
18
-
-
0019057051
-
The design of a cryptography based secure file system
-
E. Gudes. The design of a cryptography based secure file system. IEEE Transactions on Software Engineering, SE-6(5):411-419, 1980.
-
(1980)
IEEE Transactions on Software Engineering
, vol.SE-6
, Issue.5
, pp. 411-419
-
-
Gudes, E.1
-
19
-
-
0000954459
-
A cryptographic key generation scheme for multilevel data security
-
L. Harn and H. Lin. A cryptographic key generation scheme for multilevel data security. Computers and Security, 9(6):539-546, 1990.
-
(1990)
Computers and Security
, vol.9
, Issue.6
, pp. 539-546
-
-
Harn, L.1
Lin, H.2
-
20
-
-
0038103896
-
Cryptanalyses and improvements of two cryptographic key assignment schemes for dynamic access control in a user hierarchy
-
C.-L. Hsu and T.-S. Wu. Cryptanalyses and improvements of two cryptographic key assignment schemes for dynamic access control in a user hierarchy. Computers & Security, 22(5):453-456, 2003.
-
(2003)
Computers & Security
, vol.22
, Issue.5
, pp. 453-456
-
-
Hsu, C.-L.1
Wu, T.-S.2
-
21
-
-
0742285808
-
A new cryptographic key assignment scheme with time-constraint access control in a hierarchy
-
H.-F. Huang and C.-C. Chang. A new cryptographic key assignment scheme with time-constraint access control in a hierarchy. Computer Standards & Interfaces, 26:159-166, 2004.
-
(2004)
Computer Standards & Interfaces
, vol.26
, pp. 159-166
-
-
Huang, H.-F.1
Chang, C.-C.2
-
22
-
-
0032663530
-
Extension of CHW cryptographic key assignment scheme in a hierarchy
-
M.-S. Hwang. Extension of CHW cryptographic key assignment scheme in a hierarchy. IEE Proceedings - Computers & Digital Techniques, 146(4):219, 1999.
-
(1999)
IEE Proceedings - Computers & Digital Techniques
, vol.146
, Issue.4
, pp. 219
-
-
Hwang, M.-S.1
-
23
-
-
0012922503
-
An improvement of a dynamic cryptographic key assignment scheme in a tree hierarchy
-
M.-S. Hwang. An improvement of a dynamic cryptographic key assignment scheme in a tree hierarchy. Computers and Mathematics with Applications, 37:19-22, 1999.
-
(1999)
Computers and Mathematics with Applications
, vol.37
, pp. 19-22
-
-
Hwang, M.-S.1
-
24
-
-
0038053203
-
Controlling access in large partially ordered hierarchies using cryptographic keys
-
M.-S. Hwang and W.-P. Yang. Controlling access in large partially ordered hierarchies using cryptographic keys. Journal of Systems and Software, 67:99-107, 2003.
-
(2003)
Journal of Systems and Software
, vol.67
, pp. 99-107
-
-
Hwang, M.-S.1
Yang, W.-P.2
-
25
-
-
0027699915
-
Modified Chang-Hwang-Wu access control scheme
-
M.-S. Hwang, W.-P. Yang, and C.-C. Chang. Modified Chang-Hwang-Wu access control scheme. Electronics letters, 29(24):2095-2096, 1993.
-
(1993)
Electronics letters
, vol.29
, Issue.24
, pp. 2095-2096
-
-
Hwang, M.-S.1
Yang, W.-P.2
Chang, C.-C.3
-
26
-
-
0033334588
-
Cryptographic key assignment scheme for dynamic access control in a user hierarchy
-
F. Kuo, V. Shen, T. Chen, and F. Lai. Cryptographic key assignment scheme for dynamic access control in a user hierarchy. IEE Proceedings - Computers & Digital Techniques, 146(5):235-240, 1999.
-
(1999)
IEE Proceedings - Computers & Digital Techniques
, vol.146
, Issue.5
, pp. 235-240
-
-
Kuo, F.1
Shen, V.2
Chen, T.3
Lai, F.4
-
27
-
-
0032638189
-
Comments on dynamic key management schemes for access control in a hierarchy
-
N.-Y. Lee and T. Hwang. Comments on dynamic key management schemes for access control in a hierarchy. Computer Communications, 22:87-89, 1999.
-
(1999)
Computer Communications
, vol.22
, pp. 87-89
-
-
Lee, N.-Y.1
Hwang, T.2
-
28
-
-
0005719902
-
A dynamic cryptographic key assignment scheme in a tree structure
-
H. Liaw, S. Wang, and C. Lei. A dynamic cryptographic key assignment scheme in a tree structure. Computers and Mathematics with Applications, 25(6):109-114, 1993.
-
(1993)
Computers and Mathematics with Applications
, vol.25
, Issue.6
, pp. 109-114
-
-
Liaw, H.1
Wang, S.2
Lei, C.3
-
29
-
-
0031344109
-
Dynamic key management schemes for access control in a hierarchy
-
C.-H. Lin. Dynamic key management schemes for access control in a hierarchy. Computer Communications, 20:1381-1385, 1997.
-
(1997)
Computer Communications
, vol.20
, pp. 1381-1385
-
-
Lin, C.-H.1
-
30
-
-
0035149664
-
Hierarchical key assignment without public key cryptography
-
C.-H. Lin. Hierarchical key assignment without public key cryptography. Computers & Security, 20(7):612-619, 2001.
-
(2001)
Computers & Security
, vol.20
, Issue.7
, pp. 612-619
-
-
Lin, C.-H.1
-
31
-
-
0344089052
-
A new key assignment scheme for enforcing complicated access control policies in a hierarchy
-
I.-C. Lin, M.-S. Hwang, and C.-C. Chang. A new key assignment scheme for enforcing complicated access control policies in a hierarchy. Future Generation Computer Systems, 19:457-462, 2003.
-
(2003)
Future Generation Computer Systems
, vol.19
, pp. 457-462
-
-
Lin, I.-C.1
Hwang, M.-S.2
Chang, C.-C.3
-
32
-
-
0022115074
-
An optimal algorithm for assigning cryptographic keys to control access in a hierarchy
-
S. MacKinnon, P. Taylor, H. Meijer, and S. Akl. An optimal algorithm for assigning cryptographic keys to control access in a hierarchy. IEEE Transactions on Computers, C-34(9):797-802, 1985.
-
(1985)
IEEE Transactions on Computers
, vol.C-34
, Issue.9
, pp. 797-802
-
-
MacKinnon, S.1
Taylor, P.2
Meijer, H.3
Akl, S.4
-
33
-
-
33751508709
-
-
National Institute of Standards and Technology, NIST Special Publication 800-57
-
National Institute of Standards and Technology. Recommendation for Key Management - Part I: General, 2005. NIST Special Publication 800-57.
-
(2005)
Recommendation for Key Management - Part I: General
-
-
-
34
-
-
33947627660
-
-
M. Rabin. Digitalized signatures and public-key functions as intractable as factorization. Technical Report TR-212, Laboratory for Computer Science, Massachusetts Institute of Technology, Cambridge, Massachusetts, 1979.
-
M. Rabin. Digitalized signatures and public-key functions as intractable as factorization. Technical Report TR-212, Laboratory for Computer Science, Massachusetts Institute of Technology, Cambridge, Massachusetts, 1979.
-
-
-
-
36
-
-
0023962708
-
Cryptographic implementation of a tree hierarchy for access control
-
R. Sandhu. Cryptographic implementation of a tree hierarchy for access control. Information Processing Letters, 27(2):95-98, 1988.
-
(1988)
Information Processing Letters
, vol.27
, Issue.2
, pp. 95-98
-
-
Sandhu, R.1
-
37
-
-
5744237343
-
Cryptographic key assignment schemes for any access control policy
-
A. D. Santis, A. Ferrara, and B. Masucci. Cryptographic key assignment schemes for any access control policy. Information Processing Letters, 92:199-2005, 2004.
-
(2004)
Information Processing Letters
, vol.92
, pp. 199-2005
-
-
Santis, A.D.1
Ferrara, A.2
Masucci, B.3
-
38
-
-
0036222059
-
A novel key management scheme based on discrete logarithms and polynomial interpolations
-
V. Shen, T.-S. Chen, and F. Lai. A novel key management scheme based on discrete logarithms and polynomial interpolations. Computers & Security, 21(2):164-171, 2002.
-
(2002)
Computers & Security
, vol.21
, Issue.2
, pp. 164-171
-
-
Shen, V.1
Chen, T.-S.2
Lai, F.3
-
39
-
-
10044272348
-
Comments on a cryptographic key assignment scheme
-
Q. Tang and C. Mitchell. Comments on a cryptographic key assignment scheme. Computer Standards & Interfaces, 27:323-326, 2005.
-
(2005)
Computer Standards & Interfaces
, vol.27
, pp. 323-326
-
-
Tang, Q.1
Mitchell, C.2
-
40
-
-
0029210438
-
A cryptographic implementation for dynamic access control in a user hierarchy
-
H.-M. Tsai and C.-C. Chang. A cryptographic implementation for dynamic access control in a user hierarchy. Computers & Security, 14(2):159-166, 1995.
-
(1995)
Computers & Security
, vol.14
, Issue.2
, pp. 159-166
-
-
Tsai, H.-M.1
Chang, C.-C.2
-
41
-
-
0036187601
-
A time-bound ciyptographic key assignment scheme for access control in a hierarchy
-
W.-G. Tzeng. A time-bound ciyptographic key assignment scheme for access control in a hierarchy. IEEE Transactions on Knowledge and Data Engineering, 14(1):182-188, 2002.
-
(2002)
IEEE Transactions on Knowledge and Data Engineering
, vol.14
, Issue.1
, pp. 182-188
-
-
Tzeng, W.-G.1
-
42
-
-
9544234465
-
Cryptanalysis of Hwang-Yang scheme for controlling access in large partially ordered hierarchies
-
S.-Y. Wang and C.-S. Laih. Cryptanalysis of Hwang-Yang scheme for controlling access in large partially ordered hierarchies. The Journal of Systems and Software, 75:189-192, 2005.
-
(2005)
The Journal of Systems and Software
, vol.75
, pp. 189-192
-
-
Wang, S.-Y.1
Laih, C.-S.2
-
43
-
-
0035416046
-
Cryptographic key assignment scheme for overcoming the incorrectness of the CHW scheme
-
J. Wen, J. Sheu, and T. Chen. Cryptographic key assignment scheme for overcoming the incorrectness of the CHW scheme. IEE Proceedings - Communications, 148(4):260-264, 2001.
-
(2001)
IEE Proceedings - Communications
, vol.148
, Issue.4
, pp. 260-264
-
-
Wen, J.1
Sheu, J.2
Chen, T.3
-
45
-
-
0035095146
-
Cryptographic key assignment scheme for hierarchical access control
-
T.-C. Wu and C.-C. Chang. Cryptographic key assignment scheme for hierarchical access control. Computer Systems Science and Engineering, 1(1):25-28, 2001.
-
(2001)
Computer Systems Science and Engineering
, vol.1
, Issue.1
, pp. 25-28
-
-
Wu, T.-C.1
Chang, C.-C.2
-
46
-
-
10644259523
-
Access control in a hierarchy using oneway functions
-
C. Yang and C. Li. Access control in a hierarchy using oneway functions. Computers & Security, 23:659-664, 2004.
-
(2004)
Computers & Security
, vol.23
, pp. 659-664
-
-
Yang, C.1
Li, C.2
-
47
-
-
0041347682
-
Security of Tzeng's time-bound key assignment scheme for access control in a hierarchy
-
X. Yi and Y. Ye. Security of Tzeng's time-bound key assignment scheme for access control in a hierarchy. IEEE Transactions on Knowledge and Data Engineering, 15(4):1054-1055, 2003.
-
(2003)
IEEE Transactions on Knowledge and Data Engineering
, vol.15
, Issue.4
, pp. 1054-1055
-
-
Yi, X.1
Ye, Y.2
-
48
-
-
4243480270
-
New solutions to the problem of access control in a hierarchy
-
Technical Report 93-2, Department of Computer Science, University of Wollongong
-
Y. Zheng, T. Hardjono, and J. Seberry. New solutions to the problem of access control in a hierarchy. Technical Report 93-2, Department of Computer Science, University of Wollongong, 1993.
-
(1993)
-
-
Zheng, Y.1
Hardjono, T.2
Seberry, J.3
-
49
-
-
0036920852
-
A practical key management scheme for access control in a user hierarchy
-
S. Zhong. A practical key management scheme for access control in a user hierarchy. Computers & Security, 21(8):750-759, 2002.
-
(2002)
Computers & Security
, vol.21
, Issue.8
, pp. 750-759
-
-
Zhong, S.1
-
50
-
-
0038780901
-
A comment on the Chen-Chung scheme for hierarchical access control
-
S. Zhong and T. Lin. A comment on the Chen-Chung scheme for hierarchical access control. Computers & Security, 22(5):450-452, 2003.
-
(2003)
Computers & Security
, vol.22
, Issue.5
, pp. 450-452
-
-
Zhong, S.1
Lin, T.2
-
51
-
-
84956999112
-
Chinese Remainder Theorem based hierarchical access control for secure group communications
-
Proceedings of International Conference on Information and Communication Security, ICICS 2001, of, Springer-Verlag
-
X. Zou, B. Ramamurthy, and S. Magliveras. Chinese Remainder Theorem based hierarchical access control for secure group communications. In Proceedings of International Conference on Information and Communication Security, ICICS 2001, volume 2229 of Lecture Notes in Computer Science, pages 381-385. Springer-Verlag, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2229
, pp. 381-385
-
-
Zou, X.1
Ramamurthy, B.2
Magliveras, S.3
|