메뉴 건너뛰기




Volumn 12, Issue 3, 2009, Pages

Dynamic and efficient key management for access hierarchies

Author keywords

Efficient key derivation; Hierarchical access control; Key management

Indexed keywords

DIRECTED GRAPHS; EFFICIENT KEY DERIVATION; HIERARCHICAL ACCESS CONTROL; KEY MANAGEMENT; PRIVATE INFORMATIONS; PROVABLY SECURE; PSEUDO-RANDOM FUNCTIONS; PUBLIC INFORMATIONS; RANDOM ORACLE MODELS; SPACE COMPLEXITY; SYMMETRIC KEYS;

EID: 60349128962     PISSN: 10949224     EISSN: 15577406     Source Type: Journal    
DOI: 10.1145/1455526.1455531     Document Type: Article
Times cited : (205)

References (72)
  • 1
    • 84976752387 scopus 로고    scopus 로고
    • AKL, S. AND TAYLOR, P. 1983. Cryptographic solution to a problem of access control in a hierarchy. ACM Trans. Comput. Syst. 1, 3 (Sept.), 239-248.
    • AKL, S. AND TAYLOR, P. 1983. Cryptographic solution to a problem of access control in a hierarchy. ACM Trans. Comput. Syst. 1, 3 (Sept.), 239-248.
  • 2
    • 0003535981 scopus 로고
    • Optimal preprocessing for answering on-line product queries
    • 71/87, Institute of Computer Science, Tel-Aviv University
    • ALON, N. AND SCHIEBER, B. 1987. Optimal preprocessing for answering on-line product queries. Tech. rep. TR 71/87, Institute of Computer Science, Tel-Aviv University.
    • (1987) Tech. rep. TR
    • ALON, N.1    SCHIEBER, B.2
  • 4
    • 84957018842 scopus 로고    scopus 로고
    • Low cost attacks on tamper resistant devices
    • Proceedings of the Security Protocols Workshop
    • ANDERSON, R. AND KUHN, M. 1997. Low cost attacks on tamper resistant devices. In Proceedings of the Security Protocols Workshop. Lecture Notes on Computer Science, vol. 1361. 125-136.
    • (1997) Lecture Notes on Computer Science , vol.1361 , pp. 125-136
    • ANDERSON, R.1    KUHN, M.2
  • 6
    • 0003400251 scopus 로고
    • Secure computer systems: Mathematical foundations
    • Tech. rep. MTR-2547, MITRE Corporation
    • BELL, D. AND LAPADULA, L. 1973. Secure computer systems: Mathematical foundations. Tech. rep. MTR-2547, MITRE Corporation.
    • (1973)
    • BELL, D.1    LAPADULA, L.2
  • 9
  • 10
    • 38249003211 scopus 로고
    • Access control in a hierarchy using a one-way trapdoor function
    • CHANG, C. AND BUEHRER, D. 1993. Access control in a hierarchy using a one-way trapdoor function. Comput. Math. Appl. 26, 5, 71-76.
    • (1993) Comput. Math. Appl , vol.26 , Issue.5 , pp. 71-76
    • CHANG, C.1    BUEHRER, D.2
  • 12
    • 52449148136 scopus 로고
    • Computing on a free tree via complexity-preserving mappings
    • CHAZELLE, B. 1987. Computing on a free tree via complexity-preserving mappings. Algorithmica 2, 337-361.
    • (1987) Algorithmica , vol.2 , pp. 337-361
    • CHAZELLE, B.1
  • 13
    • 0036396975 scopus 로고    scopus 로고
    • Hierarchical access control based on Chinese remainder theorem and symmetric algorithm
    • CHEN, T. AND CHUNG, Y. 2002. Hierarchical access control based on Chinese remainder theorem and symmetric algorithm. Comput. Secur. 565-570.
    • (2002) Comput. Secur , pp. 565-570
    • CHEN, T.1    CHUNG, Y.2
  • 14
    • 18744363342 scopus 로고    scopus 로고
    • CHEN, T, CHUNG, Y, AND TIAN, C. 2004. A novel key management scheme for dynamic access control in a user hierarchy. In Proceedings of the IEEE Annual International Computer Software and Applications Conference COMPSAC'04, 396-401
    • CHEN, T., CHUNG, Y., AND TIAN, C. 2004. A novel key management scheme for dynamic access control in a user hierarchy. In Proceedings of the IEEE Annual International Computer Software and Applications Conference (COMPSAC'04). 396-401.
  • 15
    • 84894043862 scopus 로고
    • Flexible access control with master keys
    • Proceedings of the Proceedings of the Annual International Cryptology Conference CRYPTO'96
    • CHICK, G. AND TAVARES, S. 1990. Flexible access control with master keys. In Proceedings of the Proceedings of the Annual International Cryptology Conference (CRYPTO'96). Lecture Notes on Computer Science, vol. 435. 316-322.
    • (1990) Lecture Notes on Computer Science , vol.435 , pp. 316-322
    • CHICK, G.1    TAVARES, S.2
  • 16
    • 0141972441 scopus 로고    scopus 로고
    • New hierarchical assignment without public key cryptography
    • CHIEN, H. AND JAN, J. 2003. New hierarchical assignment without public key cryptography. Comput. Secur. 22, 6, 523-526.
    • (2003) Comput. Secur , vol.22 , Issue.6 , pp. 523-526
    • CHIEN, H.1    JAN, J.2
  • 18
    • 1842616017 scopus 로고    scopus 로고
    • Design and analysis of practical public-key encryption scheme secure against adaptive chosen ciphertext attack
    • CRAMER, R. AND SHOUP, V. 2003. Design and analysis of practical public-key encryption scheme secure against adaptive chosen ciphertext attack. SIAM J. Comput. 33, 1, 167-226.
    • (2003) SIAM J. Comput , vol.33 , Issue.1 , pp. 167-226
    • CRAMER, R.1    SHOUP, V.2
  • 20
    • 33745792230 scopus 로고    scopus 로고
    • Hierarchical key management scheme using polynomial interpolation
    • DAS, M., SAXENA, A., GULATI, V., AND PHATAK, D. 2005. Hierarchical key management scheme using polynomial interpolation. SIGOPS Oper. Syst. Rev. 39, 1, 40-47.
    • (2005) SIGOPS Oper. Syst. Rev , vol.39 , Issue.1 , pp. 40-47
    • DAS, M.1    SAXENA, A.2    GULATI, V.3    PHATAK, D.4
  • 21
    • 38049077460 scopus 로고    scopus 로고
    • Efficient provably-secure hierarchical key assignment schemes
    • Proceedings of the International Symposium on Mathematical Foundations of Computer Science MFCS'07
    • DE SANTIS, A., FERRARA, A., AND MASUCCI, B. 2007. Efficient provably-secure hierarchical key assignment schemes. In Proceedings of the International Symposium on Mathematical Foundations of Computer Science (MFCS'07). Lecture Notes on Computer Science, vol. 4708. 371-382.
    • (2007) Lecture Notes on Computer Science , vol.4708 , pp. 371-382
    • DE SANTIS, A.1    FERRARA, A.2    MASUCCI, B.3
  • 23
    • 18744384346 scopus 로고    scopus 로고
    • Scalable public-key tracing and revoking
    • DODIS, Y., FAZIO, N., KIAYIAS, A., AND YUNG, M. 2005. Scalable public-key tracing and revoking. J. Dist. Comput. 17, 4, 323-347.
    • (2005) J. Dist. Comput , vol.17 , Issue.4 , pp. 323-347
    • DODIS, Y.1    FAZIO, N.2    KIAYIAS, A.3    YUNG, M.4
  • 25
    • 18444410256 scopus 로고    scopus 로고
    • Approximating k-spanner problems for k 2
    • ELKIN, M. AND PELEG, D. 2005. Approximating k-spanner problems for k 2. Theor. Comput. Sci. 337, 1-3, 249-277.
    • (2005) Theor. Comput. Sci , vol.337 , Issue.1-3 , pp. 249-277
    • ELKIN, M.1    PELEG, D.2
  • 28
    • 0020778471 scopus 로고
    • Scomp: A solution to multilevel security problem
    • FEAIM, L. 1983. Scomp: A solution to multilevel security problem. IEEE Comput. 16, 7, 126-143.
    • (1983) IEEE Comput , vol.16 , Issue.7 , pp. 126-143
    • FEAIM, L.1
  • 30
    • 0021426157 scopus 로고
    • Fast algorithms for finding nearest common ancestors
    • HAREL, D. AND TARJAN, R. 1984. Fast algorithms for finding nearest common ancestors. SIAM J. Comput. 13, 2, 338-355.
    • (1984) SIAM J. Comput , vol.13 , Issue.2 , pp. 338-355
    • HAREL, D.1    TARJAN, R.2
  • 31
    • 0000954459 scopus 로고
    • A cryptographic key generation scheme for multilevel data security
    • HAEN, L. AND LIN, H. 1990. A cryptographic key generation scheme for multilevel data security. Comput. Secur. 9, 6, 539-546.
    • (1990) Comput. Secur , vol.9 , Issue.6 , pp. 539-546
    • HAEN, L.1    LIN, H.2
  • 33
    • 0742285808 scopus 로고    scopus 로고
    • A new cryptographic key assignment scheme with timeconstraint access control in a hierarchy
    • HUANG, H. AND CHANG, C. 2004. A new cryptographic key assignment scheme with timeconstraint access control in a hierarchy. Comput. Stand. Interfaces 26, 159-166.
    • (2004) Comput. Stand. Interfaces , vol.26 , pp. 159-166
    • HUANG, H.1    CHANG, C.2
  • 34
    • 0032689879 scopus 로고    scopus 로고
    • HWANG, M. 1999a. An improvement of novel cryptographic key assignment scheme for dynamic access control in a hierarchy. IEICE Trans. Fundam. E82-A, 2 (Mar.), 548-550.
    • HWANG, M. 1999a. An improvement of novel cryptographic key assignment scheme for dynamic access control in a hierarchy. IEICE Trans. Fundam. E82-A, 2 (Mar.), 548-550.
  • 35
    • 0000370732 scopus 로고    scopus 로고
    • A new dynamic key generation scheme for access control in a hierarchy
    • HWANG, M. 1999b. A new dynamic key generation scheme for access control in a hierarchy. Nordic J. Comput. 6, 4, 363-371.
    • (1999) Nordic J. Comput , vol.6 , Issue.4 , pp. 363-371
    • HWANG, M.1
  • 36
    • 0038053203 scopus 로고    scopus 로고
    • HWANG, M. AND YANG, W. 2003. Controlling access in large partially ordered hierarchies using cryptographic keys. J. Syst. Softw. 67, 2 (Aug.), 99-107.
    • HWANG, M. AND YANG, W. 2003. Controlling access in large partially ordered hierarchies using cryptographic keys. J. Syst. Softw. 67, 2 (Aug.), 99-107.
  • 37
    • 0005719902 scopus 로고
    • A dynamic cryptographic key assignment scheme in a tree structure
    • LIAW, H., WANG, S., AND LEI, C. 1993. A dynamic cryptographic key assignment scheme in a tree structure. Comput. Math. Appl. 25, 6, 109-114.
    • (1993) Comput. Math. Appl , vol.25 , Issue.6 , pp. 109-114
    • LIAW, H.1    WANG, S.2    LEI, C.3
  • 38
    • 0035149664 scopus 로고    scopus 로고
    • Hierarchical key assignment without public-key cryptography
    • LIN, C. 2001. Hierarchical key assignment without public-key cryptography. Comput. Secur. 20, 7, 612-619.
    • (2001) Comput. Secur , vol.20 , Issue.7 , pp. 612-619
    • LIN, C.1
  • 39
    • 0344089052 scopus 로고    scopus 로고
    • A new key assignment scheme for enforcing complicated access control policies in hierarchy
    • LIN, I., HWANG, M., AND CHANG, C. 2003. A new key assignment scheme for enforcing complicated access control policies in hierarchy. Future Gen. Comput. Syst. 19, 4, 457-462.
    • (2003) Future Gen. Comput. Syst , vol.19 , Issue.4 , pp. 457-462
    • LIN, I.1    HWANG, M.2    CHANG, C.3
  • 41
    • 0022115074 scopus 로고
    • An optimal algorithm for assigning cryptographic keys to control access in a hierarchy
    • MACKINNON, S., TAYLOR, P., MEIJER, H., AND AKL, S. 1985. An optimal algorithm for assigning cryptographic keys to control access in a hierarchy. IEEE Trans. Comput. 34, 9, 797-802.
    • (1985) IEEE Trans. Comput , vol.34 , Issue.9 , pp. 797-802
    • MACKINNON, S.1    TAYLOR, P.2    MEIJER, H.3    AKL, S.4
  • 42
    • 0345529052 scopus 로고    scopus 로고
    • MAHESHWARI, P. 2003. Enterprise application integration using a component-based architecture. In Proceedings of the IEEE Annual International Computer Software and Applications Conference COM-SAC'03, 557-563
    • MAHESHWARI, P. 2003. Enterprise application integration using a component-based architecture. In Proceedings of the IEEE Annual International Computer Software and Applications Conference (COM-SAC'03). 557-563.
  • 45
    • 0042076255 scopus 로고
    • Dynamization of order decomposable set problems
    • OVERMARS, M. AND VAN LEEUWEN, J. 1981a. Dynamization of order decomposable set problems. J. Algorithms 2, 3, 245-260.
    • (1981) J. Algorithms , vol.2 , Issue.3 , pp. 245-260
    • OVERMARS, M.1    VAN LEEUWEN, J.2
  • 46
    • 0019625505 scopus 로고    scopus 로고
    • OVERMARS, M. AND VAN LEEUWEN, J. 1981b. Maintenance of configurations in the plane. J. Comput. Syst. Sci. 23, 2, 166-204.
    • OVERMARS, M. AND VAN LEEUWEN, J. 1981b. Maintenance of configurations in the plane. J. Comput. Syst. Sci. 23, 2, 166-204.
  • 51
    • 0023962708 scopus 로고    scopus 로고
    • SANDHU, R. 1988. Cryptographic implementation of a tree hierarchy for access control. Inform. Process. Lett. 27, 2 (Jan.), 95-98.
    • SANDHU, R. 1988. Cryptographic implementation of a tree hierarchy for access control. Inform. Process. Lett. 27, 2 (Jan.), 95-98.
  • 53
    • 5744237343 scopus 로고    scopus 로고
    • SANTIS, A. D., FERRARA, A., AND MASUCCI, B. 2004. Cryptographic key assignment schemes for any access control policy. Inform. Process. Lett. 92, 4 (Nov.), 199-205.
    • SANTIS, A. D., FERRARA, A., AND MASUCCI, B. 2004. Cryptographic key assignment schemes for any access control policy. Inform. Process. Lett. 92, 4 (Nov.), 199-205.
  • 54
    • 0039719277 scopus 로고
    • Planar graphs and poset dimension
    • SCHNYDER, W. 1989. Planar graphs and poset dimension. Order 5, 323-343.
    • (1989) Order , vol.5 , pp. 323-343
    • SCHNYDER, W.1
  • 55
    • 0036222059 scopus 로고    scopus 로고
    • A novel key management scheme based on discrete logarithms and polynomial interpolations
    • SHEN, V. AND CHEN, T. 2002. A novel key management scheme based on discrete logarithms and polynomial interpolations. Comput. Secur. 21, 2, 164-171.
    • (2002) Comput. Secur , vol.21 , Issue.2 , pp. 164-171
    • SHEN, V.1    CHEN, T.2
  • 58
    • 84974085874 scopus 로고
    • Shortcutting planar digraphs
    • THORUP, M. 1995. Shortcutting planar digraphs. Comb. Probab. Comput. 4, 287-315.
    • (1995) Comb. Probab. Comput , vol.4 , pp. 287-315
    • THORUP, M.1
  • 59
    • 0013214417 scopus 로고    scopus 로고
    • Parallel shortcutting of rooted trees
    • THORUP, M. 1997. Parallel shortcutting of rooted trees. J. Algorithms 23, 1, 139-159.
    • (1997) J. Algorithms , vol.23 , Issue.1 , pp. 139-159
    • THORUP, M.1
  • 61
    • 0029210438 scopus 로고
    • A cryptographic implementation for dynamic access control in a user hierarchy
    • TSAI, H. AND CHANG, C. 1995. A cryptographic implementation for dynamic access control in a user hierarchy. Comput. Secur. 14, 2, 159-166.
    • (1995) Comput. Secur , vol.14 , Issue.2 , pp. 159-166
    • TSAI, H.1    CHANG, C.2
  • 62
    • 0036187601 scopus 로고    scopus 로고
    • A time-bound cryptographic key assignment scheme for access control in a hierarchy
    • TZENG, W. 2002. A time-bound cryptographic key assignment scheme for access control in a hierarchy. IEEE Trans. Knowl. Data Eng. 14, 1, 182-188.
    • (2002) IEEE Trans. Knowl. Data Eng , vol.14 , Issue.1 , pp. 182-188
    • TZENG, W.1
  • 64
    • 33745600842 scopus 로고    scopus 로고
    • An access control scheme for partially ordered set hierarchy with provable security. Cryptology ePrint Archive
    • Report 2004/295
    • WU, J. AND WEI, R. 2004. An access control scheme for partially ordered set hierarchy with provable security. Cryptology ePrint Archive, Report 2004/295. http://eprint.iacr.org/.
    • (2004)
    • WU, J.1    WEI, R.2
  • 65
    • 0035095146 scopus 로고    scopus 로고
    • Cryptograpic key assignment scheme for hierarchical access control
    • WU, T. AND CHANG, C. 2001. Cryptograpic key assignment scheme for hierarchical access control. Int. J. Comput. Syst. Sci. Eng. 1, 1, 25-28.
    • (2001) Int. J. Comput. Syst. Sci. Eng , vol.1 , Issue.1 , pp. 25-28
    • WU, T.1    CHANG, C.2
  • 66
    • 0000434570 scopus 로고
    • The complexity of the partial order dimension problem
    • YANNAKAKIS, M. 1982. The complexity of the partial order dimension problem. SIAM J. Algebraic Discrete Methods 3, 351-358.
    • (1982) SIAM J. Algebraic Discrete Methods , vol.3 , pp. 351-358
    • YANNAKAKIS, M.1
  • 70
    • 85029434541 scopus 로고
    • Sibling intractable function families and their applications
    • Proceedings of Advances in Cryptology ASIACRYPT'91
    • ZHENG, Y., HARDJONO, T., AND PIEPRZYK, J. 1992. Sibling intractable function families and their applications. In Proceedings of Advances in Cryptology (ASIACRYPT'91). Lecture Notes on Computer Science, vol. 739. 124-138.
    • (1992) Lecture Notes on Computer Science , vol.739 , pp. 124-138
    • ZHENG, Y.1    HARDJONO, T.2    PIEPRZYK, J.3
  • 72
    • 0036920852 scopus 로고    scopus 로고
    • A practical key management scheme for access control in a user hierarchy
    • ZHONG, S. 2002. A practical key management scheme for access control in a user hierarchy. Comput. Secur. 21, 8, 750-759.
    • (2002) Comput. Secur , vol.21 , Issue.8 , pp. 750-759
    • ZHONG, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.