메뉴 건너뛰기




Volumn 51, Issue 11, 2007, Pages 3197-3219

Key management for content access control in a hierarchy

Author keywords

Confidentiality; Content access control; Group communication; Hierarchy; Key management

Indexed keywords

HIERARCHICAL SYSTEMS; MATHEMATICAL MODELS; PUBLIC KEY CRYPTOGRAPHY;

EID: 34248671101     PISSN: 13891286     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comnet.2006.12.011     Document Type: Article
Times cited : (47)

References (55)
  • 1
    • 0019057051 scopus 로고
    • The design of a cryptography based secure file system
    • Gudes E. The design of a cryptography based secure file system. IEEE Transactions on Software Engineering SE-6 5 (1980) 411-420
    • (1980) IEEE Transactions on Software Engineering , vol.SE-6 , Issue.5 , pp. 411-420
    • Gudes, E.1
  • 2
    • 84976752387 scopus 로고
    • Cryptographic solution to a problem of access control in a hierarchy
    • Akl S., and Taylor P. Cryptographic solution to a problem of access control in a hierarchy. ACM Transactions on Computer Systems (1983) 239-248
    • (1983) ACM Transactions on Computer Systems , pp. 239-248
    • Akl, S.1    Taylor, P.2
  • 3
    • 0023580702 scopus 로고
    • On some cryptographic solutions for access control in a tree hierarchy
    • Sandhu R. On some cryptographic solutions for access control in a tree hierarchy. IEEE (1987) 405-410
    • (1987) IEEE , pp. 405-410
    • Sandhu, R.1
  • 4
    • 0023962708 scopus 로고
    • Cryptographic implementation of a tree hierarchy for access control
    • Sandhu R. Cryptographic implementation of a tree hierarchy for access control. Information Processing Letters 27 2 (1988) 95-98
    • (1988) Information Processing Letters , vol.27 , Issue.2 , pp. 95-98
    • Sandhu, R.1
  • 5
    • 0242456749 scopus 로고    scopus 로고
    • I. Ray, I. Ray, N. Narasimhamurthi, A cryptographic solution to implement access control in a hierarchy and more, in: SACMAT'02, June 3-4, 2002, pp. 65-73.
  • 6
    • 10644259523 scopus 로고    scopus 로고
    • Access control in a hierarchy using one-way functions
    • Yang C., and Li C. Access control in a hierarchy using one-way functions. Elsevier Computers and Security 23 (2004) 659-664
    • (2004) Elsevier Computers and Security , vol.23 , pp. 659-664
    • Yang, C.1    Li, C.2
  • 8
    • 0345565893 scopus 로고    scopus 로고
    • A survey of key management for secure group communication
    • Rafaeli S., and Hutchison D. A survey of key management for secure group communication. ACM Computing Surveys 35 3 (2003) 309-329
    • (2003) ACM Computing Surveys , vol.35 , Issue.3 , pp. 309-329
    • Rafaeli, S.1    Hutchison, D.2
  • 9
    • 0012943336 scopus 로고    scopus 로고
    • Secure group communications using key graphs
    • Wong C.K., Gouda M., and Lam S.S. Secure group communications using key graphs. Acm Sigcomm (1998)
    • (1998) Acm Sigcomm
    • Wong, C.K.1    Gouda, M.2    Lam, S.S.3
  • 10
    • 34248640342 scopus 로고    scopus 로고
    • T. Hardjono, Y. Zheng, J. Seberry, New solutions to the problem of access control in a hierarchy, Technical Report. Preprint 93-2.
  • 11
    • 84956999112 scopus 로고    scopus 로고
    • X. Zou, B. Ramamurthy, S.S. Magliveras, Chinese remainder theorem based hierarchical access control for secure group communication, in: ICICS'01: Proceedings of the Third International Conference on Information and Communications Security, 2001, pp. 381-385.
  • 12
    • 34248634927 scopus 로고    scopus 로고
    • D. Ma, R. Deng, Y. Wu, T. Li, Dynamic access control for multi-privileged group communications, ICICS 2004.
  • 13
    • 8344221947 scopus 로고    scopus 로고
    • Y. Sun, K.R., Liu, Scalable hierarchical access control in secure group communications, in: Proceedings of IEEE Infocom, 2004.
  • 14
    • 85181634469 scopus 로고    scopus 로고
    • S. Akl, P. Taylor, Cryptographic solution to a multilevel security problem, in: Advances in Cryptology: Proceedings of CRYPTO'82, 1982, pp. 237-249.
  • 15
    • 34248655214 scopus 로고    scopus 로고
    • D. Bell, L.L. Padula, Secure computer systems: mathematical foundation and model, MITRE Report, M74-244, MTR 2547 v2, Novemeber 1973.
  • 16
    • 0022603643 scopus 로고    scopus 로고
    • S.A. Rajunas, N. Hardy, A.C. Bomberger, W.S. Frantz, C.R. Landau, Security in keykos, in: Proceedings of the 1986 IEEE Symposium on Security and Privacy, April 1986, pp. 78-85.
  • 17
    • 34248664769 scopus 로고    scopus 로고
    • J. Crampton, Authorization and antichains, Ph.D. Dissertation, University of London, February 2002.
  • 19
    • 0031341651 scopus 로고    scopus 로고
    • R. Sandhu, V. Bhamidipati, E. Coyne, S. Ganta, C. Youman, The ARBAC97 model for role-based administration of roles: preliminary description and outline, in: Proceedings of the Second ACM Workshop on Role-Based Access Control, 1997, pp. 81-90.
  • 20
    • 84986608087 scopus 로고    scopus 로고
    • R. Sandhu, Q. Munawer, The PRA97 model for role-based administration of role hierarchies, in: Proceedings of the 14th Annual Computer Security Applications Conference, 1998, pp. 39-49.
  • 23
    • 0031611731 scopus 로고    scopus 로고
    • S. Gavrila, J. Barkley, Formal specification for role-based access control user/role and role/role relationship management, in: Proceeding of the Third ACM Workshop on Role-Based Access Control, 1998, pp. 81-90.
  • 24
    • 34248650768 scopus 로고    scopus 로고
    • H. Harney, C. Muckenhirn, RFC 2093 - Group Key Management Protocol (GKMP) Architecture, July 1997.
  • 25
    • 34248664485 scopus 로고    scopus 로고
    • D. Balenson, D. McGrew, A. Sherman, Key management for large dynamic groups: one-way function trees and amortized initialization, draft-balenson-groupkeymgmt-oft-00.txt, February 1999, internet-draft.
  • 26
    • 0034838199 scopus 로고    scopus 로고
    • A. Perrig, D. Song, J. Tygar, ELK, a new protocol for Efficient Large-group Key distribution, in: IEEE Security and Priavcy Symposium, May 2001.
  • 27
    • 34248658342 scopus 로고    scopus 로고
    • C. Wong, S. Lam, Keystone: A group key management service, in: International Conference on Telecommunication, May 2000.
  • 28
    • 34248636015 scopus 로고    scopus 로고
    • T. Hardjono, B. Weis, RFC 3740 - The multicast group security architecture, 2004.
  • 29
    • 34248652760 scopus 로고    scopus 로고
    • A. Ballardie, RFC 1949 - Scalable multicast key distribution, May 1996.
  • 30
    • 32144436209 scopus 로고    scopus 로고
    • Intra-domain group key management for multicast security
    • Hardjono T., Cain B., and Monga I. Intra-domain group key management for multicast security. IETF Internet Draft September (2000)
    • (2000) IETF Internet Draft , Issue.September
    • Hardjono, T.1    Cain, B.2    Monga, I.3
  • 31
    • 34248667686 scopus 로고    scopus 로고
    • S. Mittra, Iolus: a framework for scalable secure multicasting, ACM SIGCOMM, 1997.
  • 32
    • 0034318740 scopus 로고    scopus 로고
    • Scalable secure one-to-many group communication using dual encryption
    • Dondeti L.R., Mukherjee S., and Samal A. Scalable secure one-to-many group communication using dual encryption. Computer Communications 23 17 (2000) 1681-1701
    • (2000) Computer Communications , vol.23 , Issue.17 , pp. 1681-1701
    • Dondeti, L.R.1    Mukherjee, S.2    Samal, A.3
  • 33
    • 84948651208 scopus 로고    scopus 로고
    • S. Rafaeli, D. Hutchison, Hydra: a decentralized group key management, in: Proceedings of the 11th IEEE International WETICE: Enterprise Security Workshop, June 2002.
  • 34
    • 0033690786 scopus 로고    scopus 로고
    • S. Setia, S. Koussih, S. Jajodia, E. Harder, Kronos: A scalable group re-keying approach for secure multicast, in: Proceedings of the IEEE Symposium on Security and Privacy, May 2000.
  • 35
    • 34248684191 scopus 로고    scopus 로고
    • B. Briscoe, MARKS: Multicast key management using arbitrarily revealed key sequences, in: Proceedings of the First International Workshop on Networked Group Communication, November 1999.
  • 36
    • 0029720059 scopus 로고    scopus 로고
    • M. Steiner, G. Tsudik, M. Waidner, Diffie-Hellman key distribution extended to group communication, in: Proceedings of the Third ACM Conference on Computer and Communications Security, March 1996, pp. 31-37.
  • 37
    • 0034449805 scopus 로고    scopus 로고
    • Y. Kim, A. Perrig, G. Tsudik, Simple and fault-tolerant key agreement for dynamic collaborative groups, in: Proceedings of the Seventh ACM Conference on Computer and Communications Security, November 2000 pp. 235-244.
  • 38
    • 0032218239 scopus 로고    scopus 로고
    • C. Becker, U. Wille, Communication complexity of group key distribution, in: Proceedings of the Fifth ACM Conference on Computerand Communications Security, November 1998.
  • 41
    • 23944524527 scopus 로고    scopus 로고
    • Y. Karandikar, X. Zou, Y. Dai, Secure group communication based scheme for differential access control in dynamic environments, in: Proceedings of the 11th International Conference on Parallel and Distributed Systems - Workshops (ICPADS'05), 2005.
  • 42
    • 34248681914 scopus 로고    scopus 로고
    • Zheng, Hardjono, Pieprzyk, Sibling intractable function families and their applications, in ASIACRYPT: Advances in Cryptology - ASIACRYPT: International Conference on the Theory and Application of Cryptology. LNCS, Springer-Verlag, 1991. citeseer.csail.mit.edu/zheng92sibling.html.
  • 45
    • 0022115074 scopus 로고
    • An optimal algorithm for assigning cryptographic keys to control access in a hierarchy
    • MacKinnon S., Taylor P., Meijer H., and Akl S. An optimal algorithm for assigning cryptographic keys to control access in a hierarchy. IEEE Transactions on Computers C-34 9 (1985) 797-802
    • (1985) IEEE Transactions on Computers , vol.C-34 , Issue.9 , pp. 797-802
    • MacKinnon, S.1    Taylor, P.2    Meijer, H.3    Akl, S.4
  • 46
    • 0001387789 scopus 로고
    • A decomposition theorem for partially ordered sets
    • Dilworth R. A decomposition theorem for partially ordered sets. Ann. Math. Ser. 2 51 (1950) 161-166
    • (1950) Ann. Math. Ser. , vol.2 , Issue.51 , pp. 161-166
    • Dilworth, R.1
  • 48
    • 0036222059 scopus 로고    scopus 로고
    • A novel key management scheme based on discrete logarithms and polynomial interpolations
    • Shen V., and Chen T. A novel key management scheme based on discrete logarithms and polynomial interpolations. Computers and Security 21 2 (2002) 164-171
    • (2002) Computers and Security , vol.21 , Issue.2 , pp. 164-171
    • Shen, V.1    Chen, T.2
  • 51
    • 0038103896 scopus 로고    scopus 로고
    • Cryptanalyses and improvements of two cryptographic key assignment schemes for dynamic access control in a user hierarchy
    • Hsu C.L., and Wu T.S. Cryptanalyses and improvements of two cryptographic key assignment schemes for dynamic access control in a user hierarchy. Computers and Security 22 5 (2003) 453-456
    • (2003) Computers and Security , vol.22 , Issue.5 , pp. 453-456
    • Hsu, C.L.1    Wu, T.S.2
  • 52
    • 34248630874 scopus 로고    scopus 로고
    • H. Ragabhassan, A. Bouabdallah, H. Bettahar, Challal, Hi-kd: an efficient key management algorithm for hierarchical group communication, SecureComm, September 2005.
  • 53
    • 34248680819 scopus 로고    scopus 로고
    • D. Wallner, RFC 2627 - Key Management for multicast: issues and architecture, 1999.
  • 55
    • 11844294647 scopus 로고    scopus 로고
    • X. Zou, S. Magliveras, B. Ramamurthy., Key tree based scalable secure dynamic conferencing schemes, in: Proceedings of International Conference on Parallel and Distributed Computing and Systems (PDCS 2004), November 9-11, 2004.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.