-
1
-
-
0019057051
-
The design of a cryptography based secure file system
-
Gudes E. The design of a cryptography based secure file system. IEEE Transactions on Software Engineering SE-6 5 (1980) 411-420
-
(1980)
IEEE Transactions on Software Engineering
, vol.SE-6
, Issue.5
, pp. 411-420
-
-
Gudes, E.1
-
2
-
-
84976752387
-
Cryptographic solution to a problem of access control in a hierarchy
-
Akl S., and Taylor P. Cryptographic solution to a problem of access control in a hierarchy. ACM Transactions on Computer Systems (1983) 239-248
-
(1983)
ACM Transactions on Computer Systems
, pp. 239-248
-
-
Akl, S.1
Taylor, P.2
-
3
-
-
0023580702
-
On some cryptographic solutions for access control in a tree hierarchy
-
Sandhu R. On some cryptographic solutions for access control in a tree hierarchy. IEEE (1987) 405-410
-
(1987)
IEEE
, pp. 405-410
-
-
Sandhu, R.1
-
4
-
-
0023962708
-
Cryptographic implementation of a tree hierarchy for access control
-
Sandhu R. Cryptographic implementation of a tree hierarchy for access control. Information Processing Letters 27 2 (1988) 95-98
-
(1988)
Information Processing Letters
, vol.27
, Issue.2
, pp. 95-98
-
-
Sandhu, R.1
-
5
-
-
0242456749
-
-
I. Ray, I. Ray, N. Narasimhamurthi, A cryptographic solution to implement access control in a hierarchy and more, in: SACMAT'02, June 3-4, 2002, pp. 65-73.
-
-
-
-
6
-
-
10644259523
-
Access control in a hierarchy using one-way functions
-
Yang C., and Li C. Access control in a hierarchy using one-way functions. Elsevier Computers and Security 23 (2004) 659-664
-
(2004)
Elsevier Computers and Security
, vol.23
, pp. 659-664
-
-
Yang, C.1
Li, C.2
-
7
-
-
33745792230
-
Hierarchical key management scheme using polynomial interpolation
-
Das M.L., Saxena A., Gulati V.P., and Phatak D.B. Hierarchical key management scheme using polynomial interpolation. SIGOPS Operational Systematic Review 39 1 (2005) 40-47
-
(2005)
SIGOPS Operational Systematic Review
, vol.39
, Issue.1
, pp. 40-47
-
-
Das, M.L.1
Saxena, A.2
Gulati, V.P.3
Phatak, D.B.4
-
8
-
-
0345565893
-
A survey of key management for secure group communication
-
Rafaeli S., and Hutchison D. A survey of key management for secure group communication. ACM Computing Surveys 35 3 (2003) 309-329
-
(2003)
ACM Computing Surveys
, vol.35
, Issue.3
, pp. 309-329
-
-
Rafaeli, S.1
Hutchison, D.2
-
10
-
-
34248640342
-
-
T. Hardjono, Y. Zheng, J. Seberry, New solutions to the problem of access control in a hierarchy, Technical Report. Preprint 93-2.
-
-
-
-
11
-
-
84956999112
-
-
X. Zou, B. Ramamurthy, S.S. Magliveras, Chinese remainder theorem based hierarchical access control for secure group communication, in: ICICS'01: Proceedings of the Third International Conference on Information and Communications Security, 2001, pp. 381-385.
-
-
-
-
12
-
-
34248634927
-
-
D. Ma, R. Deng, Y. Wu, T. Li, Dynamic access control for multi-privileged group communications, ICICS 2004.
-
-
-
-
13
-
-
8344221947
-
-
Y. Sun, K.R., Liu, Scalable hierarchical access control in secure group communications, in: Proceedings of IEEE Infocom, 2004.
-
-
-
-
14
-
-
85181634469
-
-
S. Akl, P. Taylor, Cryptographic solution to a multilevel security problem, in: Advances in Cryptology: Proceedings of CRYPTO'82, 1982, pp. 237-249.
-
-
-
-
15
-
-
34248655214
-
-
D. Bell, L.L. Padula, Secure computer systems: mathematical foundation and model, MITRE Report, M74-244, MTR 2547 v2, Novemeber 1973.
-
-
-
-
16
-
-
0022603643
-
-
S.A. Rajunas, N. Hardy, A.C. Bomberger, W.S. Frantz, C.R. Landau, Security in keykos, in: Proceedings of the 1986 IEEE Symposium on Security and Privacy, April 1986, pp. 78-85.
-
-
-
-
17
-
-
34248664769
-
-
J. Crampton, Authorization and antichains, Ph.D. Dissertation, University of London, February 2002.
-
-
-
-
18
-
-
0030086382
-
Role-based access control models
-
Sandhu R., Coyne E., Feinstein H., and Youman C. Role-based access control models. IEEE Computer 29 2 (1996) 38-47
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
19
-
-
0031341651
-
-
R. Sandhu, V. Bhamidipati, E. Coyne, S. Ganta, C. Youman, The ARBAC97 model for role-based administration of roles: preliminary description and outline, in: Proceedings of the Second ACM Workshop on Role-Based Access Control, 1997, pp. 81-90.
-
-
-
-
20
-
-
84986608087
-
-
R. Sandhu, Q. Munawer, The PRA97 model for role-based administration of role hierarchies, in: Proceedings of the 14th Annual Computer Security Applications Conference, 1998, pp. 39-49.
-
-
-
-
23
-
-
0031611731
-
-
S. Gavrila, J. Barkley, Formal specification for role-based access control user/role and role/role relationship management, in: Proceeding of the Third ACM Workshop on Role-Based Access Control, 1998, pp. 81-90.
-
-
-
-
24
-
-
34248650768
-
-
H. Harney, C. Muckenhirn, RFC 2093 - Group Key Management Protocol (GKMP) Architecture, July 1997.
-
-
-
-
25
-
-
34248664485
-
-
D. Balenson, D. McGrew, A. Sherman, Key management for large dynamic groups: one-way function trees and amortized initialization, draft-balenson-groupkeymgmt-oft-00.txt, February 1999, internet-draft.
-
-
-
-
26
-
-
0034838199
-
-
A. Perrig, D. Song, J. Tygar, ELK, a new protocol for Efficient Large-group Key distribution, in: IEEE Security and Priavcy Symposium, May 2001.
-
-
-
-
27
-
-
34248658342
-
-
C. Wong, S. Lam, Keystone: A group key management service, in: International Conference on Telecommunication, May 2000.
-
-
-
-
28
-
-
34248636015
-
-
T. Hardjono, B. Weis, RFC 3740 - The multicast group security architecture, 2004.
-
-
-
-
29
-
-
34248652760
-
-
A. Ballardie, RFC 1949 - Scalable multicast key distribution, May 1996.
-
-
-
-
30
-
-
32144436209
-
Intra-domain group key management for multicast security
-
Hardjono T., Cain B., and Monga I. Intra-domain group key management for multicast security. IETF Internet Draft September (2000)
-
(2000)
IETF Internet Draft
, Issue.September
-
-
Hardjono, T.1
Cain, B.2
Monga, I.3
-
31
-
-
34248667686
-
-
S. Mittra, Iolus: a framework for scalable secure multicasting, ACM SIGCOMM, 1997.
-
-
-
-
32
-
-
0034318740
-
Scalable secure one-to-many group communication using dual encryption
-
Dondeti L.R., Mukherjee S., and Samal A. Scalable secure one-to-many group communication using dual encryption. Computer Communications 23 17 (2000) 1681-1701
-
(2000)
Computer Communications
, vol.23
, Issue.17
, pp. 1681-1701
-
-
Dondeti, L.R.1
Mukherjee, S.2
Samal, A.3
-
33
-
-
84948651208
-
-
S. Rafaeli, D. Hutchison, Hydra: a decentralized group key management, in: Proceedings of the 11th IEEE International WETICE: Enterprise Security Workshop, June 2002.
-
-
-
-
34
-
-
0033690786
-
-
S. Setia, S. Koussih, S. Jajodia, E. Harder, Kronos: A scalable group re-keying approach for secure multicast, in: Proceedings of the IEEE Symposium on Security and Privacy, May 2000.
-
-
-
-
35
-
-
34248684191
-
-
B. Briscoe, MARKS: Multicast key management using arbitrarily revealed key sequences, in: Proceedings of the First International Workshop on Networked Group Communication, November 1999.
-
-
-
-
36
-
-
0029720059
-
-
M. Steiner, G. Tsudik, M. Waidner, Diffie-Hellman key distribution extended to group communication, in: Proceedings of the Third ACM Conference on Computer and Communications Security, March 1996, pp. 31-37.
-
-
-
-
37
-
-
0034449805
-
-
Y. Kim, A. Perrig, G. Tsudik, Simple and fault-tolerant key agreement for dynamic collaborative groups, in: Proceedings of the Seventh ACM Conference on Computer and Communications Security, November 2000 pp. 235-244.
-
-
-
-
38
-
-
0032218239
-
-
C. Becker, U. Wille, Communication complexity of group key distribution, in: Proceedings of the Fifth ACM Conference on Computerand Communications Security, November 1998.
-
-
-
-
41
-
-
23944524527
-
-
Y. Karandikar, X. Zou, Y. Dai, Secure group communication based scheme for differential access control in dynamic environments, in: Proceedings of the 11th International Conference on Parallel and Distributed Systems - Workshops (ICPADS'05), 2005.
-
-
-
-
42
-
-
34248681914
-
-
Zheng, Hardjono, Pieprzyk, Sibling intractable function families and their applications, in ASIACRYPT: Advances in Cryptology - ASIACRYPT: International Conference on the Theory and Application of Cryptology. LNCS, Springer-Verlag, 1991. citeseer.csail.mit.edu/zheng92sibling.html.
-
-
-
-
45
-
-
0022115074
-
An optimal algorithm for assigning cryptographic keys to control access in a hierarchy
-
MacKinnon S., Taylor P., Meijer H., and Akl S. An optimal algorithm for assigning cryptographic keys to control access in a hierarchy. IEEE Transactions on Computers C-34 9 (1985) 797-802
-
(1985)
IEEE Transactions on Computers
, vol.C-34
, Issue.9
, pp. 797-802
-
-
MacKinnon, S.1
Taylor, P.2
Meijer, H.3
Akl, S.4
-
46
-
-
0001387789
-
A decomposition theorem for partially ordered sets
-
Dilworth R. A decomposition theorem for partially ordered sets. Ann. Math. Ser. 2 51 (1950) 161-166
-
(1950)
Ann. Math. Ser.
, vol.2
, Issue.51
, pp. 161-166
-
-
Dilworth, R.1
-
48
-
-
0036222059
-
A novel key management scheme based on discrete logarithms and polynomial interpolations
-
Shen V., and Chen T. A novel key management scheme based on discrete logarithms and polynomial interpolations. Computers and Security 21 2 (2002) 164-171
-
(2002)
Computers and Security
, vol.21
, Issue.2
, pp. 164-171
-
-
Shen, V.1
Chen, T.2
-
51
-
-
0038103896
-
Cryptanalyses and improvements of two cryptographic key assignment schemes for dynamic access control in a user hierarchy
-
Hsu C.L., and Wu T.S. Cryptanalyses and improvements of two cryptographic key assignment schemes for dynamic access control in a user hierarchy. Computers and Security 22 5 (2003) 453-456
-
(2003)
Computers and Security
, vol.22
, Issue.5
, pp. 453-456
-
-
Hsu, C.L.1
Wu, T.S.2
-
52
-
-
34248630874
-
-
H. Ragabhassan, A. Bouabdallah, H. Bettahar, Challal, Hi-kd: an efficient key management algorithm for hierarchical group communication, SecureComm, September 2005.
-
-
-
-
53
-
-
34248680819
-
-
D. Wallner, RFC 2627 - Key Management for multicast: issues and architecture, 1999.
-
-
-
-
54
-
-
0000636954
-
The VersaKey framework: versatile group key management
-
Waldvogel M., Caronni G., Sun D., Weiler N., and Plattner B. The VersaKey framework: versatile group key management. IEEE Journal on Selected Areas in Communications (Special Issues on Middleware) 17 8 (1999) 1614-1631
-
(1999)
IEEE Journal on Selected Areas in Communications (Special Issues on Middleware)
, vol.17
, Issue.8
, pp. 1614-1631
-
-
Waldvogel, M.1
Caronni, G.2
Sun, D.3
Weiler, N.4
Plattner, B.5
-
55
-
-
11844294647
-
-
X. Zou, S. Magliveras, B. Ramamurthy., Key tree based scalable secure dynamic conferencing schemes, in: Proceedings of International Conference on Parallel and Distributed Computing and Systems (PDCS 2004), November 9-11, 2004.
-
-
-
|