메뉴 건너뛰기




Volumn 178, Issue 1, 2008, Pages 230-243

Access control in user hierarchy based on elliptic curve cryptosystem

Author keywords

Access control; Elliptic curve cryptosystem; Key management; User hierarchy

Indexed keywords

COMPUTATIONAL METHODS; CRYPTOGRAPHY; FUNCTIONS; HIERARCHICAL SYSTEMS; PROBLEM SOLVING;

EID: 34948898634     PISSN: 00200255     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ins.2007.08.001     Document Type: Article
Times cited : (54)

References (23)
  • 3
    • 33746681250 scopus 로고    scopus 로고
    • A.D. Santis, A.L. Ferrara, B. Masucci, A new key assignment scheme for access control in a complete tree hierarchy, in: Proceeding of the International Workshop on Coding and Cryptography-WCC 2005, LNCS 3969, 2006, pp. 202-217.
  • 4
    • 5744237343 scopus 로고    scopus 로고
    • Cryptographic key assignment schemes for any access control policy
    • Nov
    • Santis A.D., Ferrara A.L., and Masucci B. Cryptographic key assignment schemes for any access control policy. Information Processing Letters 92 4 (2004) 199-205 Nov
    • (2004) Information Processing Letters , vol.92 , Issue.4 , pp. 199-205
    • Santis, A.D.1    Ferrara, A.L.2    Masucci, B.3
  • 5
    • 33645890580 scopus 로고    scopus 로고
    • Enforcing the security of a time-bound hierarchical key assignment scheme
    • June
    • Santis A.D., Ferrara A.L., and Masucci B. Enforcing the security of a time-bound hierarchical key assignment scheme. Information Sciences 176 12 (2006) 1684-1694 June
    • (2006) Information Sciences , vol.176 , Issue.12 , pp. 1684-1694
    • Santis, A.D.1    Ferrara, A.L.2    Masucci, B.3
  • 6
    • 3042595322 scopus 로고    scopus 로고
    • C.C. Chang, I.C. Lin, H.M. Tsai, H.H. Wang, A key assignment scheme for controlling access in partially ordered user hierarchies, in: Proceedings of the 18th IEEE International Conference on Advanced Information Networking and Applications (AINA2004), Fukuoka, Japan, vol. 2, March 2004, pp. 376-379.
  • 7
    • 0031344109 scopus 로고    scopus 로고
    • Dynamic key management schemes for access control in a hierarchy
    • Lin C.H. Dynamic key management schemes for access control in a hierarchy. Computer Communications 20 15 (1997) 1381-1385
    • (1997) Computer Communications , vol.20 , Issue.15 , pp. 1381-1385
    • Lin, C.H.1
  • 9
    • 33745856988 scopus 로고    scopus 로고
    • An efficient key-management scheme for hierarchical access control based on elliptic curve cryptosystem
    • Oct
    • Jeng F.G., and Wang C.M. An efficient key-management scheme for hierarchical access control based on elliptic curve cryptosystem. Journal of Systems and Software 79 8 (2006) 1161-1167 Oct
    • (2006) Journal of Systems and Software , vol.79 , Issue.8 , pp. 1161-1167
    • Jeng, F.G.1    Wang, C.M.2
  • 11
    • 34948851528 scopus 로고    scopus 로고
    • m) Suitable for Elliptic Curve Cryptography, Oregon EUA, June 2000. Supervisor: Dr. Cetin K. Koc. Available from: .
  • 12
    • 0029210438 scopus 로고
    • A cryptographic implementation for dynamic access control in a user hierarchy
    • Tsai H.M., and Chang C.C. A cryptographic implementation for dynamic access control in a user hierarchy. Computers and Security 14 2 (1995) 159-166
    • (1995) Computers and Security , vol.14 , Issue.2 , pp. 159-166
    • Tsai, H.M.1    Chang, C.C.2
  • 13
    • 0037960156 scopus 로고    scopus 로고
    • Key assignment for enforcing access control policy exceptions in distributed systems
    • Yeh J.H., Chow R., and Newman R. Key assignment for enforcing access control policy exceptions in distributed systems. Information Sciences 152 (2003) 63-88
    • (2003) Information Sciences , vol.152 , pp. 63-88
    • Yeh, J.H.1    Chow, R.2    Newman, R.3
  • 14
    • 33745584616 scopus 로고    scopus 로고
    • J. Wu, R. Wei, An access control scheme for partially ordered set hierarchy with provable security, in: Proceedings of SAC 2005, LNCS 3897, 2006, pp. 221-232.
  • 15
    • 0000954459 scopus 로고
    • A cryptographic key generation scheme for multilevel data security
    • Harn L., and Lin H.Y. A cryptographic key generation scheme for multilevel data security. Computers and Security 9 6 (1990) 539-546
    • (1990) Computers and Security , vol.9 , Issue.6 , pp. 539-546
    • Harn, L.1    Lin, H.Y.2
  • 16
    • 33644499446 scopus 로고    scopus 로고
    • M.A. Strangio, Efficient Diffie-Hellmann two-party key agreement protocols based on elliptic curves, in: Proceedings of the 2005 ACM Symposium on Applied Computing, 2005, pp. 324-331.
  • 17
    • 0038053203 scopus 로고    scopus 로고
    • Controlling access in large partially-ordered hierarchies using cryptographic keys
    • Hwang M.S., and Yang W.P. Controlling access in large partially-ordered hierarchies using cryptographic keys. Journal of Systems and Software 67 2 (2003) 99-107
    • (2003) Journal of Systems and Software , vol.67 , Issue.2 , pp. 99-107
    • Hwang, M.S.1    Yang, W.P.2
  • 18
    • 0043135196 scopus 로고    scopus 로고
    • Elliptic curve cryptosystem-The answer to strong, fast public-key cryptography for securing constrained environments
    • Vanstone S.A. Elliptic curve cryptosystem-The answer to strong, fast public-key cryptography for securing constrained environments. Information Security Technical Report 2 2 (1997) 78-87
    • (1997) Information Security Technical Report , vol.2 , Issue.2 , pp. 78-87
    • Vanstone, S.A.1
  • 19
    • 84976752387 scopus 로고
    • Cryptographic solution to a problem of access control in a hierarchy
    • Akl S.G., and Taylor P.D. Cryptographic solution to a problem of access control in a hierarchy. ACM Transactions on Computer Systems 1 3 (1983) 239-248
    • (1983) ACM Transactions on Computer Systems , vol.1 , Issue.3 , pp. 239-248
    • Akl, S.G.1    Taylor, P.D.2
  • 20
    • 0022115074 scopus 로고
    • An optimal algorithm for assigning cryptographic keys to control access in a hierarchy
    • MacKinnon S.J., Taylor P.D., Meijer H., and Akl S.G. An optimal algorithm for assigning cryptographic keys to control access in a hierarchy. IEEE Transactions on Computers 34 9 (1985) 797-802
    • (1985) IEEE Transactions on Computers , vol.34 , Issue.9 , pp. 797-802
    • MacKinnon, S.J.1    Taylor, P.D.2    Meijer, H.3    Akl, S.G.4
  • 21
    • 0036222059 scopus 로고    scopus 로고
    • A novel key management scheme based on discrete logarithms and polynomial interpolations
    • Shen V.R.L., and Chen T.S. A novel key management scheme based on discrete logarithms and polynomial interpolations. Computers and Security 21 2 (2002) 164-171
    • (2002) Computers and Security , vol.21 , Issue.2 , pp. 164-171
    • Shen, V.R.L.1    Chen, T.S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.