메뉴 건너뛰기




Volumn 1, Issue , 2009, Pages 550-553

An efficient key management scheme for access control in a user hierarchy

Author keywords

Chinese remainder theorem; Key management; User hierarchy

Indexed keywords

ACCESS RIGHTS; CHINESE REMAINDER THEOREM; CRYPTOGRAPHIC KEY; KEY MANAGEMENT; ONE WAY HASH FUNCTIONS; SECRET KEY; USER HIERARCHY;

EID: 71049162944     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ITCS.2009.119     Document Type: Conference Paper
Times cited : (5)

References (11)
  • 1
    • 84976752387 scopus 로고
    • Cryptographic solution to a problem of access control in a hierarchy
    • Aug. doi:10.1145/357369.357372
    • S.G. Akl, P.D. Taylor, "Cryptographic Solution to a Problem of Access Control in a Hierarchy." ACM Transactions on Computer System,vol. 1., Aug.1983, pp. 239-248, doi:10.1145/357369.357372
    • (1983) ACM Transactions on Computer System , vol.1 , pp. 239-248
    • Akl, S.G.1    Taylor, P.D.2
  • 2
    • 0022115074 scopus 로고
    • An optimal algorithm for assigning cryptographic keys to control access in a hierarchy
    • Sep., doi:10.1109/TC.1985.1676635
    • S.J. Mackinnon, P.D. Taylor, H. Meijer, and S.G. Akl, "An optimal algorithm for assigning cryptographic keys to control access in a hierarchy" IEEE Transaction on Computers, vol.34, Sep. 1985, pp.789-802, doi:10.1109/TC.1985.1676635
    • (1985) IEEE Transaction on Computers , vol.34 , pp. 789-802
    • Mackinnon, S.J.1    Taylor, P.D.2    Meijer, H.3    Akl, S.G.4
  • 3
    • 0023962708 scopus 로고
    • CRYPTOGRAPHIC IMPLEMENTATION OF A TREE HIERARCHY FOR ACCESS CONTROL.
    • DOI 10.1016/0020-0190(88)90099-3
    • R. S. Sandhu, "Cryptographic Implementation of a Tree Hierarchy for Access Control", Information Processing Letters, vol.27, Feb.1988, pp.95-98, doi: 10.1016/0020-0190(88)90099-3 (Pubitemid 18588349)
    • (1988) Information Processing Letters , vol.27 , Issue.2 , pp. 95-98
    • Sandhu Ravinderpal, S.1
  • 4
    • 0000954459 scopus 로고
    • A cryptographic key generation scheme for multilevel data security
    • Oct., doi: 10.1016/0167-4048(90)90132-D
    • L. Harn and H. Y. Lin, "A Cryptographic Key Generation Scheme for Multilevel Data Security," Computer and Security, vol.9,Oct.1990, pp.539-546, doi: 10.1016/0167-4048(90)90132-D
    • (1990) Computer and Security , vol.9 , pp. 539-546
    • Harn, L.1    Lin, H.Y.2
  • 6
    • 0012922503 scopus 로고    scopus 로고
    • An improvement of a dynamic cryptographic key assignment schemes in a tree hierarchy
    • Feb., doi:10.1016/S0898-1221(99)00042-5
    • M. S. Hwang, " An Improvement of a Dynamic Cryptographic Key Assignment Schemes in a Tree Hierarchy", Computers & Mathematics with Application,s, vol. 37, Feb.1999, pp.19-22, doi: 10.1016/S0898-1221(99)00042-5
    • (1999) Computers & Mathematics with Application,s , vol.37 , pp. 19-22
    • Hwang, M.S.1
  • 7
    • 0036222059 scopus 로고    scopus 로고
    • A novel key management scheme based on discrete logarithms and polynomial interpolations
    • DOI 10.1016/S0167-4048(02)00211-0
    • R. L. Victor and T. S. Chen, " A Novel Key Management Scheme Based on Discrete Logarithms and Polynomial Interpolations," Computer and Security, vol. 21, March 2002, pp.164-171, doi:10.1016/S0167-4048(02)00211-0 (Pubitemid 34288358)
    • (2002) Computers and Security , vol.21 , Issue.2 , pp. 164-171
    • Shen, V.R.L.1    Chen, T.-S.2
  • 8
    • 0038103896 scopus 로고    scopus 로고
    • Cryptanaylsis and improvements of two cryptographic key assignment schemes for dynamic access control in a user hierarchy
    • July, doi:10.1016/S0167-4048(03)00514-5
    • C. L. Hsu and T. S. Wu, "Cryptanaylsis and Improvements of Two Cryptographic Key Assignment Schemes for Dynamic Access Control in a User Hierarchy", Computer & Secrity, vol. 22, July, pp.452-456, doi:10.1016/S0167-4048(03)00514-5
    • Computer & Secrity , vol.22 , pp. 452-456
    • Hsu, C.L.1    Wu, T.S.2
  • 9
    • 0038053203 scopus 로고    scopus 로고
    • Controlling access in large partially ordered hierarchies using cryptographic keys
    • Aug., doi: 10.1016/S0164-1212(02)00091-2
    • M. S. Hwang and W. P. Yang " Controlling Access in Large Partially Ordered Hierarchies Using Cryptographic Keys." The Journal of Systemes and Software, vol67, Aug.2003, pp: 99-107, doi: 10.1016/S0164-1212(02)00091-2
    • (2003) The Journal of Systemes and Software , vol.67 , pp. 99-107
    • Hwang, M.S.1    Yang, W.P.2
  • 10
    • 9544234465 scopus 로고    scopus 로고
    • Cryptanalysis of wang-yang scheme for controlling access in large partially ordered hierarchies
    • Feb., doi:10.1016/j.jss.2004.04.015
    • S. Y. Wang, C. S. Laih "Cryptanalysis of Wang-Yang Scheme for Controlling Access in Large Partially Ordered Hierarchies", The Journal of System and Software, vol75, Feb.2005, pp :189-192, doi:10.1016/j.jss.2004.04.015
    • (2005) The Journal of System and Software , vol.75 , pp. 189-192
    • Wang, S.Y.1    Laih, C.S.2
  • 11
    • 0033751899 scopus 로고    scopus 로고
    • An asymmetric cryptographic scheme for a totally- ordered hierarchy
    • Oct., doi: 10.1080/00207160008804909
    • M. S. Huang "An Asymmetric Cryptographic Scheme for a Totally- ordered Hierarchy." International Journal of Computer Mathematics vol.73,Oct.2000, pp: 463-468, doi: 10.1080/00207160008804909
    • (2000) International Journal of Computer Mathematics , vol.73 , pp. 463-468
    • Huang, M.S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.