메뉴 건너뛰기




Volumn 17, Issue 6, 2007, Pages 437-450

A dynamic key management solution to access hierarchy

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER NETWORKS; CRYPTOGRAPHY; MATHEMATICAL MODELS; NUMBER THEORY; POLYNOMIALS; PROBLEM SOLVING;

EID: 35948945322     PISSN: 10557148     EISSN: 10991190     Source Type: Journal    
DOI: 10.1002/nem.656     Document Type: Article
Times cited : (6)

References (35)
  • 5
    • 0003103622 scopus 로고
    • Protection (computer system access)
    • Lampson B. Protection (computer system access). Operating Systems Review 1974; 8(1): 18-24.
    • (1974) Operating Systems Review , vol.8 , Issue.1 , pp. 18-24
    • Lampson, B.1
  • 6
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • Denning DE. A lattice model of secure information flow. Communications of the ACM 1976; 19(5): 236-243.
    • (1976) Communications of the ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.1
  • 7
    • 0027699087 scopus 로고
    • Lattice-based access control model
    • Sandhu RS. Lattice-based access control model. IEEE Computer 1993; 26(11): 9-19.
    • (1993) IEEE Computer , vol.26 , Issue.11 , pp. 9-19
    • Sandhu, R.S.1
  • 10
    • 0242540377 scopus 로고    scopus 로고
    • RBAC for collaborative environments: Role-based access control for collaborative enterprise in peer-to-peer computing environments
    • Park JS, Hwang J. RBAC for collaborative environments: role-based access control for collaborative enterprise in peer-to-peer computing environments. In Proceedings of the Eighth ACM Symposium on Access Control Models and Technologies, 2003; 93-99.
    • (2003) Proceedings of the Eighth ACM Symposium on Access Control Models and Technologies , pp. 93-99
    • Park, J.S.1    Hwang, J.2
  • 12
    • 0344984336 scopus 로고    scopus 로고
    • A scalable key-management scheme with minimizing key storage for secure group communications
    • Tseng YM. A scalable key-management scheme with minimizing key storage for secure group communications. International Journal of Network Management 2003; 13(6): 419-425.
    • (2003) International Journal of Network Management , vol.13 , Issue.6 , pp. 419-425
    • Tseng, Y.M.1
  • 16
    • 84976752387 scopus 로고
    • A cryptographic solution to the problem of access control in a hierarchy
    • Akl SG, Taylor PD. A cryptographic solution to the problem of access control in a hierarchy. ACM Transactions on Computer Systems 1983; 1(3): 239-248.
    • (1983) ACM Transactions on Computer Systems , vol.1 , Issue.3 , pp. 239-248
    • Akl, S.G.1    Taylor, P.D.2
  • 17
    • 0022115074 scopus 로고
    • An optimal algorithm for assigning cryptographic keys to control access in a hierarchy
    • MacKinnon SJ, Taylor PD, Meijer H, Akl SG. An optimal algorithm for assigning cryptographic keys to control access in a hierarchy. IEEE Transactions on Computers 1985; 34(9): 797-802.
    • (1985) IEEE Transactions on Computers , vol.34 , Issue.9 , pp. 797-802
    • MacKinnon, S.J.1    Taylor, P.D.2    Meijer, H.3    Akl, S.G.4
  • 18
    • 84894043862 scopus 로고
    • Flexible access control with master keys
    • Proceedings on Advances in Cryptology CRYPTO '89
    • Chick GC, Tavares SE. Flexible access control with master keys. In Proceedings on Advances in Cryptology (CRYPTO '89), LNCS 435, 1989; 316-322.
    • (1989) LNCS , vol.435 , pp. 316-322
    • Chick, G.C.1    Tavares, S.E.2
  • 19
    • 0031344109 scopus 로고    scopus 로고
    • Dynamic key management scheme for access control in a hierarchy
    • Lin CH. Dynamic key management scheme for access control in a hierarchy. Computer Communications 1997; 20(15): 1381-1385.
    • (1997) Computer Communications , vol.20 , Issue.15 , pp. 1381-1385
    • Lin, C.H.1
  • 20
    • 0023962708 scopus 로고
    • Cryptographic implementation of a tree hierarchy for access control
    • Sandhu RS. Cryptographic implementation of a tree hierarchy for access control. Information Processing Letters 1988; 27(2): 95-98.
    • (1988) Information Processing Letters , vol.27 , Issue.2 , pp. 95-98
    • Sandhu, R.S.1
  • 21
    • 0036920852 scopus 로고    scopus 로고
    • A practical key management scheme for access control in a user hierarchy
    • Zhong S. A practical key management scheme for access control in a user hierarchy. Computers and Security 2002; 21(8): 750-759.
    • (2002) Computers and Security , vol.21 , Issue.8 , pp. 750-759
    • Zhong, S.1
  • 22
    • 18744363342 scopus 로고    scopus 로고
    • Chen TS, Chung YF, Tian CS. A novel key management scheme for dynamic access control in a user hierarchy. In International Computer Software and Applications Conference COMPSAC, 2004; 396-397
    • Chen TS, Chung YF, Tian CS. A novel key management scheme for dynamic access control in a user hierarchy. In International Computer Software and Applications Conference (COMPSAC), 2004; 396-397.
  • 23
    • 4444372561 scopus 로고    scopus 로고
    • An efficient key assignment for access control in large partially ordered hierarchy
    • Hwang MS, Liu CH, Lo JW. An efficient key assignment for access control in large partially ordered hierarchy. Journal of Systems and Software 2004; 73(3): 507-514.
    • (2004) Journal of Systems and Software , vol.73 , Issue.3 , pp. 507-514
    • Hwang, M.S.1    Liu, C.H.2    Lo, J.W.3
  • 24
    • 0036222059 scopus 로고    scopus 로고
    • A novel key management scheme based on discrete logarithms and polynomial interpolations
    • Shen VRL, Chen TS. A novel key management scheme based on discrete logarithms and polynomial interpolations. Computers and Security 2002; 21(2): 164-171.
    • (2002) Computers and Security , vol.21 , Issue.2 , pp. 164-171
    • Shen, V.R.L.1    Chen, T.S.2
  • 27
    • 0000954459 scopus 로고
    • A cryptographic key generation scheme for multilevel data security
    • Harn L, Lin HY. A cryptographic key generation scheme for multilevel data security. Computers and Security 1990; 9(6): 539-546.
    • (1990) Computers and Security , vol.9 , Issue.6 , pp. 539-546
    • Harn, L.1    Lin, H.Y.2
  • 28
    • 0001692137 scopus 로고
    • Cryptographic key assignment scheme for access control in a hierarchy
    • Chang CC, Hwang RJ, Wu TC. Cryptographic key assignment scheme for access control in a hierarchy. Information Systems 1992; 17(3): 243-247.
    • (1992) Information Systems , vol.17 , Issue.3 , pp. 243-247
    • Chang, C.C.1    Hwang, R.J.2    Wu, T.C.3
  • 31
    • 2542477337 scopus 로고    scopus 로고
    • Scalable and lightweight key distribution for secure group communications
    • Lee FY, Shieh SP. Scalable and lightweight key distribution for secure group communications. International Journal of Network Management 2004; 14(3): 167-176.
    • (2004) International Journal of Network Management , vol.14 , Issue.3 , pp. 167-176
    • Lee, F.Y.1    Shieh, S.P.2
  • 32
    • 18844408349 scopus 로고    scopus 로고
    • Efficient authenticated key agreement protocols resistant to a denial-of-service attack
    • Tseng YM. Efficient authenticated key agreement protocols resistant to a denial-of-service attack. International Journal of Network Management 2005; 15(3): 193-202.
    • (2005) International Journal of Network Management , vol.15 , Issue.3 , pp. 193-202
    • Tseng, Y.M.1
  • 34
    • 0003400251 scopus 로고
    • Secure computer systems: Mathematical foundations
    • Technical Report MTR2547, MLTRE Corporation: Bedford, MA
    • Bell D, LaPadula L. Secure computer systems: mathematical foundations. Technical Report MTR2547, MLTRE Corporation: Bedford, MA, 1973.
    • (1973)
    • Bell, D.1    LaPadula, L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.