메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 98-111

On key assignment for hierarchical access control

Author keywords

[No Author keywords available]

Indexed keywords

DATA FLOW ANALYSIS; ENGINEERING RESEARCH; HIERARCHICAL SYSTEMS; PUBLIC KEY CRYPTOGRAPHY;

EID: 33947630349     PISSN: 10636900     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSFW.2006.20     Document Type: Conference Paper
Times cited : (98)

References (51)
  • 1
    • 84976752387 scopus 로고
    • Cryptographic solution to a problem of access control in a hierarchy
    • S. Akl and P. Taylor. Cryptographic solution to a problem of access control in a hierarchy. ACM Transactions on Computer Systems, 1(3):239-248, 1983.
    • (1983) ACM Transactions on Computer Systems , vol.1 , Issue.3 , pp. 239-248
    • Akl, S.1    Taylor, P.2
  • 3
    • 0003400251 scopus 로고
    • Secure computer systems: Unified exposition and Multics interpretation
    • Technical Report MTR-2997, Mitre Corporation, Bedford, Massachusetts
    • D. Bell and L. LaPadula. Secure computer systems: Unified exposition and Multics interpretation. Technical Report MTR-2997, Mitre Corporation, Bedford, Massachusetts, 1976.
    • (1976)
    • Bell, D.1    LaPadula, L.2
  • 4
    • 0001692137 scopus 로고
    • Cryptographic key assignment scheme for access control in a hierarchy
    • C.-C. Chang, R.-J. Hwang, and T.-C. Wu. Cryptographic key assignment scheme for access control in a hierarchy. Information Systems, 17(3):243-247, 1992.
    • (1992) Information Systems , vol.17 , Issue.3 , pp. 243-247
    • Chang, C.-C.1    Hwang, R.-J.2    Wu, T.-C.3
  • 5
    • 0036396975 scopus 로고    scopus 로고
    • Hierarchical access control based on Chinese Remainder Theorem and symmetric algorithm
    • T.-S. Chen and Y.-F. Chung. Hierarchical access control based on Chinese Remainder Theorem and symmetric algorithm. Computers & Security, 21(6):565-570, 2002.
    • (2002) Computers & Security , vol.21 , Issue.6 , pp. 565-570
    • Chen, T.-S.1    Chung, Y.-F.2
  • 6
    • 10444280844 scopus 로고    scopus 로고
    • A novel key management scheme for dynamic access control in a user hierarchy
    • T.-S. Chen and J.-Y. Huang. A novel key management scheme for dynamic access control in a user hierarchy. Applied Mathematics and Computation, 162:339-351, 2005.
    • (2005) Applied Mathematics and Computation , vol.162 , pp. 339-351
    • Chen, T.-S.1    Huang, J.-Y.2
  • 7
    • 4944263232 scopus 로고    scopus 로고
    • Modified cryptographic key assignment scheme for overcoming the incorrectness of the CHW scheme
    • T.-S. Chen, K.-H. Huang, and Y.-F. Chung. Modified cryptographic key assignment scheme for overcoming the incorrectness of the CHW scheme. Applied Mathematics and Computation, 159:147-155, 2004.
    • (2004) Applied Mathematics and Computation , vol.159 , pp. 147-155
    • Chen, T.-S.1    Huang, K.-H.2    Chung, Y.-F.3
  • 9
    • 84894043862 scopus 로고
    • Flexible access control with master keys
    • Advances in Cryptology, CRYPTO'89, of, Springer-Verlag
    • G. Chick and S. Tavares. Flexible access control with master keys. In Advances in Cryptology - CRYPTO'89, volume 435 of Lecture Notes in Computer Science, pages 316-322. Springer-Verlag, 1990.
    • (1990) Lecture Notes in Computer Science , vol.435 , pp. 316-322
    • Chick, G.1    Tavares, S.2
  • 10
    • 13844281059 scopus 로고    scopus 로고
    • Efficient time-bound hierarchical key assignment scheme
    • H.-Y. Chien. Efficient time-bound hierarchical key assignment scheme. IEEE Transactions on Knowledge and Data Engineering, 16(10):1301-1304, 2004.
    • (2004) IEEE Transactions on Knowledge and Data Engineering , vol.16 , Issue.10 , pp. 1301-1304
    • Chien, H.-Y.1
  • 11
    • 0141972441 scopus 로고    scopus 로고
    • New hierarchical assignment without public key cryptography
    • H.-Y. Chien and J.-K. Jan. New hierarchical assignment without public key cryptography. Computers & Security, 22(6):523-526, 2003.
    • (2003) Computers & Security , vol.22 , Issue.6 , pp. 523-526
    • Chien, H.-Y.1    Jan, J.-K.2
  • 13
    • 3142510989 scopus 로고    scopus 로고
    • Administrative scope: A foundation for role-based administrative models
    • J. Crampton and G. Loizou. Administrative scope: A foundation for role-based administrative models. ACM Transactions on Information and System Security, 6(2):201-231, 2003.
    • (2003) ACM Transactions on Information and System Security , vol.6 , Issue.2 , pp. 201-231
    • Crampton, J.1    Loizou, G.2
  • 15
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • D. Denning. A lattice model of secure information flow. Communications of the ACM, 19(5):236-243, 1976.
    • (1976) Communications of the ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.1
  • 16
    • 0004218585 scopus 로고    scopus 로고
    • Cambridge University Press, Cambridge, United Kingdom
    • K. Engel. Sperner Theory. Cambridge University Press, Cambridge, United Kingdom, 1997.
    • (1997) Sperner Theory
    • Engel, K.1
  • 17
    • 0142156584 scopus 로고    scopus 로고
    • An information-theoretic approach to the access control problem
    • C. Blundo and C. Laneve, editors, ICTCS 2003, of, Springer-Verlag
    • A. Ferrara and B. Masucci. An information-theoretic approach to the access control problem. In C. Blundo and C. Laneve, editors, ICTCS 2003, volume 2841 of Lecture Notes in Computer Science, pages 342-354. Springer-Verlag, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2841 , pp. 342-354
    • Ferrara, A.1    Masucci, B.2
  • 18
    • 0019057051 scopus 로고
    • The design of a cryptography based secure file system
    • E. Gudes. The design of a cryptography based secure file system. IEEE Transactions on Software Engineering, SE-6(5):411-419, 1980.
    • (1980) IEEE Transactions on Software Engineering , vol.SE-6 , Issue.5 , pp. 411-419
    • Gudes, E.1
  • 19
    • 0000954459 scopus 로고
    • A cryptographic key generation scheme for multilevel data security
    • L. Harn and H. Lin. A cryptographic key generation scheme for multilevel data security. Computers and Security, 9(6):539-546, 1990.
    • (1990) Computers and Security , vol.9 , Issue.6 , pp. 539-546
    • Harn, L.1    Lin, H.2
  • 20
    • 0038103896 scopus 로고    scopus 로고
    • Cryptanalyses and improvements of two cryptographic key assignment schemes for dynamic access control in a user hierarchy
    • C.-L. Hsu and T.-S. Wu. Cryptanalyses and improvements of two cryptographic key assignment schemes for dynamic access control in a user hierarchy. Computers & Security, 22(5):453-456, 2003.
    • (2003) Computers & Security , vol.22 , Issue.5 , pp. 453-456
    • Hsu, C.-L.1    Wu, T.-S.2
  • 21
    • 0742285808 scopus 로고    scopus 로고
    • A new cryptographic key assignment scheme with time-constraint access control in a hierarchy
    • H.-F. Huang and C.-C. Chang. A new cryptographic key assignment scheme with time-constraint access control in a hierarchy. Computer Standards & Interfaces, 26:159-166, 2004.
    • (2004) Computer Standards & Interfaces , vol.26 , pp. 159-166
    • Huang, H.-F.1    Chang, C.-C.2
  • 22
    • 0032663530 scopus 로고    scopus 로고
    • Extension of CHW cryptographic key assignment scheme in a hierarchy
    • M.-S. Hwang. Extension of CHW cryptographic key assignment scheme in a hierarchy. IEE Proceedings - Computers & Digital Techniques, 146(4):219, 1999.
    • (1999) IEE Proceedings - Computers & Digital Techniques , vol.146 , Issue.4 , pp. 219
    • Hwang, M.-S.1
  • 23
    • 0012922503 scopus 로고    scopus 로고
    • An improvement of a dynamic cryptographic key assignment scheme in a tree hierarchy
    • M.-S. Hwang. An improvement of a dynamic cryptographic key assignment scheme in a tree hierarchy. Computers and Mathematics with Applications, 37:19-22, 1999.
    • (1999) Computers and Mathematics with Applications , vol.37 , pp. 19-22
    • Hwang, M.-S.1
  • 24
    • 0038053203 scopus 로고    scopus 로고
    • Controlling access in large partially ordered hierarchies using cryptographic keys
    • M.-S. Hwang and W.-P. Yang. Controlling access in large partially ordered hierarchies using cryptographic keys. Journal of Systems and Software, 67:99-107, 2003.
    • (2003) Journal of Systems and Software , vol.67 , pp. 99-107
    • Hwang, M.-S.1    Yang, W.-P.2
  • 25
    • 0027699915 scopus 로고
    • Modified Chang-Hwang-Wu access control scheme
    • M.-S. Hwang, W.-P. Yang, and C.-C. Chang. Modified Chang-Hwang-Wu access control scheme. Electronics letters, 29(24):2095-2096, 1993.
    • (1993) Electronics letters , vol.29 , Issue.24 , pp. 2095-2096
    • Hwang, M.-S.1    Yang, W.-P.2    Chang, C.-C.3
  • 26
    • 0033334588 scopus 로고    scopus 로고
    • Cryptographic key assignment scheme for dynamic access control in a user hierarchy
    • F. Kuo, V. Shen, T. Chen, and F. Lai. Cryptographic key assignment scheme for dynamic access control in a user hierarchy. IEE Proceedings - Computers & Digital Techniques, 146(5):235-240, 1999.
    • (1999) IEE Proceedings - Computers & Digital Techniques , vol.146 , Issue.5 , pp. 235-240
    • Kuo, F.1    Shen, V.2    Chen, T.3    Lai, F.4
  • 27
    • 0032638189 scopus 로고    scopus 로고
    • Comments on dynamic key management schemes for access control in a hierarchy
    • N.-Y. Lee and T. Hwang. Comments on dynamic key management schemes for access control in a hierarchy. Computer Communications, 22:87-89, 1999.
    • (1999) Computer Communications , vol.22 , pp. 87-89
    • Lee, N.-Y.1    Hwang, T.2
  • 28
    • 0005719902 scopus 로고
    • A dynamic cryptographic key assignment scheme in a tree structure
    • H. Liaw, S. Wang, and C. Lei. A dynamic cryptographic key assignment scheme in a tree structure. Computers and Mathematics with Applications, 25(6):109-114, 1993.
    • (1993) Computers and Mathematics with Applications , vol.25 , Issue.6 , pp. 109-114
    • Liaw, H.1    Wang, S.2    Lei, C.3
  • 29
    • 0031344109 scopus 로고    scopus 로고
    • Dynamic key management schemes for access control in a hierarchy
    • C.-H. Lin. Dynamic key management schemes for access control in a hierarchy. Computer Communications, 20:1381-1385, 1997.
    • (1997) Computer Communications , vol.20 , pp. 1381-1385
    • Lin, C.-H.1
  • 30
    • 0035149664 scopus 로고    scopus 로고
    • Hierarchical key assignment without public key cryptography
    • C.-H. Lin. Hierarchical key assignment without public key cryptography. Computers & Security, 20(7):612-619, 2001.
    • (2001) Computers & Security , vol.20 , Issue.7 , pp. 612-619
    • Lin, C.-H.1
  • 31
    • 0344089052 scopus 로고    scopus 로고
    • A new key assignment scheme for enforcing complicated access control policies in a hierarchy
    • I.-C. Lin, M.-S. Hwang, and C.-C. Chang. A new key assignment scheme for enforcing complicated access control policies in a hierarchy. Future Generation Computer Systems, 19:457-462, 2003.
    • (2003) Future Generation Computer Systems , vol.19 , pp. 457-462
    • Lin, I.-C.1    Hwang, M.-S.2    Chang, C.-C.3
  • 32
    • 0022115074 scopus 로고
    • An optimal algorithm for assigning cryptographic keys to control access in a hierarchy
    • S. MacKinnon, P. Taylor, H. Meijer, and S. Akl. An optimal algorithm for assigning cryptographic keys to control access in a hierarchy. IEEE Transactions on Computers, C-34(9):797-802, 1985.
    • (1985) IEEE Transactions on Computers , vol.C-34 , Issue.9 , pp. 797-802
    • MacKinnon, S.1    Taylor, P.2    Meijer, H.3    Akl, S.4
  • 33
    • 33751508709 scopus 로고    scopus 로고
    • National Institute of Standards and Technology, NIST Special Publication 800-57
    • National Institute of Standards and Technology. Recommendation for Key Management - Part I: General, 2005. NIST Special Publication 800-57.
    • (2005) Recommendation for Key Management - Part I: General
  • 34
    • 33947627660 scopus 로고    scopus 로고
    • M. Rabin. Digitalized signatures and public-key functions as intractable as factorization. Technical Report TR-212, Laboratory for Computer Science, Massachusetts Institute of Technology, Cambridge, Massachusetts, 1979.
    • M. Rabin. Digitalized signatures and public-key functions as intractable as factorization. Technical Report TR-212, Laboratory for Computer Science, Massachusetts Institute of Technology, Cambridge, Massachusetts, 1979.
  • 36
    • 0023962708 scopus 로고
    • Cryptographic implementation of a tree hierarchy for access control
    • R. Sandhu. Cryptographic implementation of a tree hierarchy for access control. Information Processing Letters, 27(2):95-98, 1988.
    • (1988) Information Processing Letters , vol.27 , Issue.2 , pp. 95-98
    • Sandhu, R.1
  • 37
    • 5744237343 scopus 로고    scopus 로고
    • Cryptographic key assignment schemes for any access control policy
    • A. D. Santis, A. Ferrara, and B. Masucci. Cryptographic key assignment schemes for any access control policy. Information Processing Letters, 92:199-2005, 2004.
    • (2004) Information Processing Letters , vol.92 , pp. 199-2005
    • Santis, A.D.1    Ferrara, A.2    Masucci, B.3
  • 38
    • 0036222059 scopus 로고    scopus 로고
    • A novel key management scheme based on discrete logarithms and polynomial interpolations
    • V. Shen, T.-S. Chen, and F. Lai. A novel key management scheme based on discrete logarithms and polynomial interpolations. Computers & Security, 21(2):164-171, 2002.
    • (2002) Computers & Security , vol.21 , Issue.2 , pp. 164-171
    • Shen, V.1    Chen, T.-S.2    Lai, F.3
  • 39
    • 10044272348 scopus 로고    scopus 로고
    • Comments on a cryptographic key assignment scheme
    • Q. Tang and C. Mitchell. Comments on a cryptographic key assignment scheme. Computer Standards & Interfaces, 27:323-326, 2005.
    • (2005) Computer Standards & Interfaces , vol.27 , pp. 323-326
    • Tang, Q.1    Mitchell, C.2
  • 40
    • 0029210438 scopus 로고
    • A cryptographic implementation for dynamic access control in a user hierarchy
    • H.-M. Tsai and C.-C. Chang. A cryptographic implementation for dynamic access control in a user hierarchy. Computers & Security, 14(2):159-166, 1995.
    • (1995) Computers & Security , vol.14 , Issue.2 , pp. 159-166
    • Tsai, H.-M.1    Chang, C.-C.2
  • 41
    • 0036187601 scopus 로고    scopus 로고
    • A time-bound ciyptographic key assignment scheme for access control in a hierarchy
    • W.-G. Tzeng. A time-bound ciyptographic key assignment scheme for access control in a hierarchy. IEEE Transactions on Knowledge and Data Engineering, 14(1):182-188, 2002.
    • (2002) IEEE Transactions on Knowledge and Data Engineering , vol.14 , Issue.1 , pp. 182-188
    • Tzeng, W.-G.1
  • 42
    • 9544234465 scopus 로고    scopus 로고
    • Cryptanalysis of Hwang-Yang scheme for controlling access in large partially ordered hierarchies
    • S.-Y. Wang and C.-S. Laih. Cryptanalysis of Hwang-Yang scheme for controlling access in large partially ordered hierarchies. The Journal of Systems and Software, 75:189-192, 2005.
    • (2005) The Journal of Systems and Software , vol.75 , pp. 189-192
    • Wang, S.-Y.1    Laih, C.-S.2
  • 43
    • 0035416046 scopus 로고    scopus 로고
    • Cryptographic key assignment scheme for overcoming the incorrectness of the CHW scheme
    • J. Wen, J. Sheu, and T. Chen. Cryptographic key assignment scheme for overcoming the incorrectness of the CHW scheme. IEE Proceedings - Communications, 148(4):260-264, 2001.
    • (2001) IEE Proceedings - Communications , vol.148 , Issue.4 , pp. 260-264
    • Wen, J.1    Sheu, J.2    Chen, T.3
  • 45
    • 0035095146 scopus 로고    scopus 로고
    • Cryptographic key assignment scheme for hierarchical access control
    • T.-C. Wu and C.-C. Chang. Cryptographic key assignment scheme for hierarchical access control. Computer Systems Science and Engineering, 1(1):25-28, 2001.
    • (2001) Computer Systems Science and Engineering , vol.1 , Issue.1 , pp. 25-28
    • Wu, T.-C.1    Chang, C.-C.2
  • 46
    • 10644259523 scopus 로고    scopus 로고
    • Access control in a hierarchy using oneway functions
    • C. Yang and C. Li. Access control in a hierarchy using oneway functions. Computers & Security, 23:659-664, 2004.
    • (2004) Computers & Security , vol.23 , pp. 659-664
    • Yang, C.1    Li, C.2
  • 47
    • 0041347682 scopus 로고    scopus 로고
    • Security of Tzeng's time-bound key assignment scheme for access control in a hierarchy
    • X. Yi and Y. Ye. Security of Tzeng's time-bound key assignment scheme for access control in a hierarchy. IEEE Transactions on Knowledge and Data Engineering, 15(4):1054-1055, 2003.
    • (2003) IEEE Transactions on Knowledge and Data Engineering , vol.15 , Issue.4 , pp. 1054-1055
    • Yi, X.1    Ye, Y.2
  • 48
    • 4243480270 scopus 로고
    • New solutions to the problem of access control in a hierarchy
    • Technical Report 93-2, Department of Computer Science, University of Wollongong
    • Y. Zheng, T. Hardjono, and J. Seberry. New solutions to the problem of access control in a hierarchy. Technical Report 93-2, Department of Computer Science, University of Wollongong, 1993.
    • (1993)
    • Zheng, Y.1    Hardjono, T.2    Seberry, J.3
  • 49
    • 0036920852 scopus 로고    scopus 로고
    • A practical key management scheme for access control in a user hierarchy
    • S. Zhong. A practical key management scheme for access control in a user hierarchy. Computers & Security, 21(8):750-759, 2002.
    • (2002) Computers & Security , vol.21 , Issue.8 , pp. 750-759
    • Zhong, S.1
  • 50
    • 0038780901 scopus 로고    scopus 로고
    • A comment on the Chen-Chung scheme for hierarchical access control
    • S. Zhong and T. Lin. A comment on the Chen-Chung scheme for hierarchical access control. Computers & Security, 22(5):450-452, 2003.
    • (2003) Computers & Security , vol.22 , Issue.5 , pp. 450-452
    • Zhong, S.1    Lin, T.2
  • 51
    • 84956999112 scopus 로고    scopus 로고
    • Chinese Remainder Theorem based hierarchical access control for secure group communications
    • Proceedings of International Conference on Information and Communication Security, ICICS 2001, of, Springer-Verlag
    • X. Zou, B. Ramamurthy, and S. Magliveras. Chinese Remainder Theorem based hierarchical access control for secure group communications. In Proceedings of International Conference on Information and Communication Security, ICICS 2001, volume 2229 of Lecture Notes in Computer Science, pages 381-385. Springer-Verlag, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2229 , pp. 381-385
    • Zou, X.1    Ramamurthy, B.2    Magliveras, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.