메뉴 건너뛰기




Volumn , Issue , 2007, Pages 82-92

Efficient techniques for realizing geo-spatial access control

Author keywords

Geo spatial access control; Key assignment and derivation; Key management

Indexed keywords

GRID COMPUTING; HIERARCHICAL SYSTEMS; INFORMATION MANAGEMENT; INFORMATION RETRIEVAL; OPTIMIZATION; USER INTERFACES;

EID: 34748839039     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1229285.1229301     Document Type: Conference Paper
Times cited : (19)

References (28)
  • 1
    • 84976752387 scopus 로고
    • Cryptographic solution to a problem of access control in a hierarchy
    • Sept
    • S. Akl and P. Taylor. Cryptographic solution to a problem of access control in a hierarchy. ACM Transactions on Computer Systems, 1(3):239-248, Sept. 1983.
    • (1983) ACM Transactions on Computer Systems , vol.1 , Issue.3 , pp. 239-248
    • Akl, S.1    Taylor, P.2
  • 3
    • 33745793594 scopus 로고    scopus 로고
    • M. Atallah, M. Blanton, N. Fazio, and K. Frikken. Dynamic and efficient key management for access hierarchies. Preliminary version appeared in ACM Conference on Computer and Communications Security (CCS'05), full version is available as Technical Report TR. 2006-09, CERIAS, Purdue University, 2006.
    • M. Atallah, M. Blanton, N. Fazio, and K. Frikken. Dynamic and efficient key management for access hierarchies. Preliminary version appeared in ACM Conference on Computer and Communications Security (CCS'05), full version is available as Technical Report TR. 2006-09, CERIAS, Purdue University, 2006.
  • 4
    • 34748817739 scopus 로고    scopus 로고
    • An efficient and provably-secure time-based key assignment scheme
    • M. Atallah, M. Blanton, and K. Frikken. An efficient and provably-secure time-based key assignment scheme. Under submission, 2006.
    • (2006) Under submission
    • Atallah, M.1    Blanton, M.2    Frikken, K.3
  • 5
    • 33748049115 scopus 로고    scopus 로고
    • M. Atallah, M. Blanton, and K. Frikken. Key management for non-tree access hierarchies. In ACM Symposium on Access Control Models and Technologies (SACMAT'06), Full version available at http://www.cs.purdue. edu/homes/mbykova/papers/key-derivation.pdf, pages 11-18, 2006.
    • M. Atallah, M. Blanton, and K. Frikken. Key management for non-tree access hierarchies. In ACM Symposium on Access Control Models and Technologies (SACMAT'06), Full version available at http://www.cs.purdue. edu/homes/mbykova/papers/key-derivation.pdf, pages 11-18, 2006.
  • 6
    • 34547282859 scopus 로고    scopus 로고
    • G. Ateniese, A. De Santis, A. Ferrara, and B. Masucci. Provably-secure time-bound hierarchical key assignment schemes. In A CM Conference on Computer and Communications Security (CCS'06), 2006. Full version is available as Cryptology ePrint Archive Report 2006/255, http://eprint.lacr.org/ 2006/225.
    • G. Ateniese, A. De Santis, A. Ferrara, and B. Masucci. Provably-secure time-bound hierarchical key assignment schemes. In A CM Conference on Computer and Communications Security (CCS'06), 2006. Full version is available as Cryptology ePrint Archive Report 2006/255, http://eprint.lacr.org/ 2006/225.
  • 10
    • 18744363342 scopus 로고    scopus 로고
    • T. Chen, Y. Chung, and C. Tian. A novel key management scheme for dynamic access control in a user hierarchy. In IEEE Annual International Computer Software and Applications Conference COMPSAC04, pages 396-401, Sept. 2004
    • T. Chen, Y. Chung, and C. Tian. A novel key management scheme for dynamic access control in a user hierarchy. In IEEE Annual International Computer Software and Applications Conference (COMPSAC04), pages 396-401, Sept. 2004.
  • 12
    • 0141972441 scopus 로고    scopus 로고
    • New hierarchical assignment without public key cryptography
    • H. Chien and J. Jan. New hierarchical assignment without public key cryptography. Computers & Security, 22(6):523-526, 2003.
    • (2003) Computers & Security , vol.22 , Issue.6 , pp. 523-526
    • Chien, H.1    Jan, J.2
  • 14
    • 33645890580 scopus 로고    scopus 로고
    • Enforcing the security of a time-bound hierarchical key assignment scheme
    • A. De Santis, A. Ferrara, and B. Masucci. Enforcing the security of a time-bound hierarchical key assignment scheme. Information Sciences, 176(12):1684-1694, 2006.
    • (2006) Information Sciences , vol.176 , Issue.12 , pp. 1684-1694
    • De Santis, A.1    Ferrara, A.2    Masucci, B.3
  • 16
    • 0021426157 scopus 로고
    • Fast algorithms for finding nearest common ancestors
    • D. Harel and R. Tarjan. Fast algorithms for finding nearest common ancestors. SIAM Journal of Computing, 13(2):338-355, 1984.
    • (1984) SIAM Journal of Computing , vol.13 , Issue.2 , pp. 338-355
    • Harel, D.1    Tarjan, R.2
  • 18
    • 0742285808 scopus 로고    scopus 로고
    • A new cryptographic key assignment scheme with time-constraint access control in a hierarchy
    • H. Huang and C. Chang. A new cryptographic key assignment scheme with time-constraint access control in a hierarchy. Computer Standards & Interfaces, 26:159-166, 2004.
    • (2004) Computer Standards & Interfaces , vol.26 , pp. 159-166
    • Huang, H.1    Chang, C.2
  • 19
    • 0035149664 scopus 로고    scopus 로고
    • Hierarchical key assignment without public-key cryptography
    • C. Lin. Hierarchical key assignment without public-key cryptography. Computers & Security, 20(7):612-619, 2001.
    • (2001) Computers & Security , vol.20 , Issue.7 , pp. 612-619
    • Lin, C.1
  • 23
    • 0036187601 scopus 로고    scopus 로고
    • A time-bound cryptographic key assignment scheme for access control in a hierarchy
    • W. Tzeng. A time-bound cryptographic key assignment scheme for access control in a hierarchy. IEEE Transactions on Knowledge and Data Engineering (TKDE), 14(1):182-188, 2002.
    • (2002) IEEE Transactions on Knowledge and Data Engineering (TKDE) , vol.14 , Issue.1 , pp. 182-188
    • Tzeng, W.1
  • 25
    • 3042774924 scopus 로고    scopus 로고
    • Location management for mobile commerce applications in wireless internet environment
    • U. Varshney. Location management for mobile commerce applications in wireless internet environment. ACM Transactions on Internet Technology (TOIT), 3(3):236-255, 2003.
    • (2003) ACM Transactions on Internet Technology (TOIT) , vol.3 , Issue.3 , pp. 236-255
    • Varshney, U.1
  • 26
    • 32844471813 scopus 로고    scopus 로고
    • Merging: An efficient solution for a time-bound hierarchical key assignment scheme
    • S.-Y. Wang and C-S. Laih. Merging: an efficient solution for a time-bound hierarchical key assignment scheme. IEEE Transactions on Dependable and Secure Computing, 3(1):91-100, 2006.
    • (2006) IEEE Transactions on Dependable and Secure Computing , vol.3 , Issue.1 , pp. 91-100
    • Wang, S.-Y.1    Laih, C.-S.2
  • 28
    • 0036920852 scopus 로고    scopus 로고
    • A practical key management scheme for access control in a user hierarchy
    • S. Zhong. A practical key management scheme for access control in a user hierarchy. Computers & Security, 21(8):750-759, 2002.
    • (2002) Computers & Security , vol.21 , Issue.8 , pp. 750-759
    • Zhong, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.