-
1
-
-
84976752387
-
Cryptographic solution to a problem of access control in a hierarchy
-
Sept
-
S. Akl and P. Taylor. Cryptographic solution to a problem of access control in a hierarchy. ACM Transactions on Computer Systems, 1(3):239-248, Sept. 1983.
-
(1983)
ACM Transactions on Computer Systems
, vol.1
, Issue.3
, pp. 239-248
-
-
Akl, S.1
Taylor, P.2
-
2
-
-
34247380764
-
Supporting location-based conditions in access control policies
-
C. Ardagna, M. Cremonini, E. Damiani, S. De Capitani di Vimercati, and P. Samarati. Supporting location-based conditions in access control policies. In A CM Symposium on Information, Computer and Communications Security (ASIACCS'06), pages 212-222, 2006.
-
(2006)
A CM Symposium on Information, Computer and Communications Security (ASIACCS'06)
, pp. 212-222
-
-
Ardagna, C.1
Cremonini, M.2
Damiani, E.3
De Capitani di Vimercati, S.4
Samarati, P.5
-
3
-
-
33745793594
-
-
M. Atallah, M. Blanton, N. Fazio, and K. Frikken. Dynamic and efficient key management for access hierarchies. Preliminary version appeared in ACM Conference on Computer and Communications Security (CCS'05), full version is available as Technical Report TR. 2006-09, CERIAS, Purdue University, 2006.
-
M. Atallah, M. Blanton, N. Fazio, and K. Frikken. Dynamic and efficient key management for access hierarchies. Preliminary version appeared in ACM Conference on Computer and Communications Security (CCS'05), full version is available as Technical Report TR. 2006-09, CERIAS, Purdue University, 2006.
-
-
-
-
4
-
-
34748817739
-
An efficient and provably-secure time-based key assignment scheme
-
M. Atallah, M. Blanton, and K. Frikken. An efficient and provably-secure time-based key assignment scheme. Under submission, 2006.
-
(2006)
Under submission
-
-
Atallah, M.1
Blanton, M.2
Frikken, K.3
-
5
-
-
33748049115
-
-
M. Atallah, M. Blanton, and K. Frikken. Key management for non-tree access hierarchies. In ACM Symposium on Access Control Models and Technologies (SACMAT'06), Full version available at http://www.cs.purdue. edu/homes/mbykova/papers/key-derivation.pdf, pages 11-18, 2006.
-
M. Atallah, M. Blanton, and K. Frikken. Key management for non-tree access hierarchies. In ACM Symposium on Access Control Models and Technologies (SACMAT'06), Full version available at http://www.cs.purdue. edu/homes/mbykova/papers/key-derivation.pdf, pages 11-18, 2006.
-
-
-
-
6
-
-
34547282859
-
-
G. Ateniese, A. De Santis, A. Ferrara, and B. Masucci. Provably-secure time-bound hierarchical key assignment schemes. In A CM Conference on Computer and Communications Security (CCS'06), 2006. Full version is available as Cryptology ePrint Archive Report 2006/255, http://eprint.lacr.org/ 2006/225.
-
G. Ateniese, A. De Santis, A. Ferrara, and B. Masucci. Provably-secure time-bound hierarchical key assignment schemes. In A CM Conference on Computer and Communications Security (CCS'06), 2006. Full version is available as Cryptology ePrint Archive Report 2006/255, http://eprint.lacr.org/ 2006/225.
-
-
-
-
9
-
-
30644474741
-
GEO-RBAC: A spatially aware RBAC
-
E. Bertino, B. Catania, M. Damiani, and P. Perlasca. GEO-RBAC: a spatially aware RBAC. In ACM Symposium on Access Control Models and Technologies (SACMAT'06), pages 29-37, 2005.
-
(2005)
ACM Symposium on Access Control Models and Technologies (SACMAT'06)
, pp. 29-37
-
-
Bertino, E.1
Catania, B.2
Damiani, M.3
Perlasca, P.4
-
10
-
-
18744363342
-
-
T. Chen, Y. Chung, and C. Tian. A novel key management scheme for dynamic access control in a user hierarchy. In IEEE Annual International Computer Software and Applications Conference COMPSAC04, pages 396-401, Sept. 2004
-
T. Chen, Y. Chung, and C. Tian. A novel key management scheme for dynamic access control in a user hierarchy. In IEEE Annual International Computer Software and Applications Conference (COMPSAC04), pages 396-401, Sept. 2004.
-
-
-
-
12
-
-
0141972441
-
New hierarchical assignment without public key cryptography
-
H. Chien and J. Jan. New hierarchical assignment without public key cryptography. Computers & Security, 22(6):523-526, 2003.
-
(2003)
Computers & Security
, vol.22
, Issue.6
, pp. 523-526
-
-
Chien, H.1
Jan, J.2
-
14
-
-
33645890580
-
Enforcing the security of a time-bound hierarchical key assignment scheme
-
A. De Santis, A. Ferrara, and B. Masucci. Enforcing the security of a time-bound hierarchical key assignment scheme. Information Sciences, 176(12):1684-1694, 2006.
-
(2006)
Information Sciences
, vol.176
, Issue.12
, pp. 1684-1694
-
-
De Santis, A.1
Ferrara, A.2
Masucci, B.3
-
16
-
-
0021426157
-
Fast algorithms for finding nearest common ancestors
-
D. Harel and R. Tarjan. Fast algorithms for finding nearest common ancestors. SIAM Journal of Computing, 13(2):338-355, 1984.
-
(1984)
SIAM Journal of Computing
, vol.13
, Issue.2
, pp. 338-355
-
-
Harel, D.1
Tarjan, R.2
-
18
-
-
0742285808
-
A new cryptographic key assignment scheme with time-constraint access control in a hierarchy
-
H. Huang and C. Chang. A new cryptographic key assignment scheme with time-constraint access control in a hierarchy. Computer Standards & Interfaces, 26:159-166, 2004.
-
(2004)
Computer Standards & Interfaces
, vol.26
, pp. 159-166
-
-
Huang, H.1
Chang, C.2
-
19
-
-
0035149664
-
Hierarchical key assignment without public-key cryptography
-
C. Lin. Hierarchical key assignment without public-key cryptography. Computers & Security, 20(7):612-619, 2001.
-
(2001)
Computers & Security
, vol.20
, Issue.7
, pp. 612-619
-
-
Lin, C.1
-
20
-
-
19544382894
-
Towards scalable location-aware services: Requirements and research issues
-
M. Mokbel, W. Aref, S. Hambrusch, and S. Prabhakar. Towards scalable location-aware services: requirements and research issues. In A CM International Symposium on Advances in Geographic Information Systems (GIS'03), pages 110-117, 2003.
-
(2003)
A CM International Symposium on Advances in Geographic Information Systems (GIS'03)
, pp. 110-117
-
-
Mokbel, M.1
Aref, W.2
Hambrusch, S.3
Prabhakar, S.4
-
21
-
-
3042682160
-
Challenges in location-aware computing
-
C. Patterson, R. Muntz, and C. Pancake. Challenges in location-aware computing. IEEE Pervasive Computing, 2(2):80-89, 2003.
-
(2003)
IEEE Pervasive Computing
, vol.2
, Issue.2
, pp. 80-89
-
-
Patterson, C.1
Muntz, R.2
Pancake, C.3
-
23
-
-
0036187601
-
A time-bound cryptographic key assignment scheme for access control in a hierarchy
-
W. Tzeng. A time-bound cryptographic key assignment scheme for access control in a hierarchy. IEEE Transactions on Knowledge and Data Engineering (TKDE), 14(1):182-188, 2002.
-
(2002)
IEEE Transactions on Knowledge and Data Engineering (TKDE)
, vol.14
, Issue.1
, pp. 182-188
-
-
Tzeng, W.1
-
25
-
-
3042774924
-
Location management for mobile commerce applications in wireless internet environment
-
U. Varshney. Location management for mobile commerce applications in wireless internet environment. ACM Transactions on Internet Technology (TOIT), 3(3):236-255, 2003.
-
(2003)
ACM Transactions on Internet Technology (TOIT)
, vol.3
, Issue.3
, pp. 236-255
-
-
Varshney, U.1
-
26
-
-
32844471813
-
Merging: An efficient solution for a time-bound hierarchical key assignment scheme
-
S.-Y. Wang and C-S. Laih. Merging: an efficient solution for a time-bound hierarchical key assignment scheme. IEEE Transactions on Dependable and Secure Computing, 3(1):91-100, 2006.
-
(2006)
IEEE Transactions on Dependable and Secure Computing
, vol.3
, Issue.1
, pp. 91-100
-
-
Wang, S.-Y.1
Laih, C.-S.2
-
28
-
-
0036920852
-
A practical key management scheme for access control in a user hierarchy
-
S. Zhong. A practical key management scheme for access control in a user hierarchy. Computers & Security, 21(8):750-759, 2002.
-
(2002)
Computers & Security
, vol.21
, Issue.8
, pp. 750-759
-
-
Zhong, S.1
|