-
1
-
-
84976752387
-
Cryptographic solution to a problem of access control in a hierarchy
-
Akl S.G., and Taylor P.D. Cryptographic solution to a problem of access control in a hierarchy. ACM Trans. Comput. Syst. 1 3 (1983) 239-248
-
(1983)
ACM Trans. Comput. Syst.
, vol.1
, Issue.3
, pp. 239-248
-
-
Akl, S.G.1
Taylor, P.D.2
-
2
-
-
84958760029
-
A revocation scheme with minimal storage at receivers, advances in cryptology
-
T. Asano, A revocation scheme with minimal storage at receivers, advances in cryptology, in: Proc. of ASIACRYPT 2002, 2002, pp. 433-450
-
(2002)
Proc. of ASIACRYPT
, pp. 433-450
-
-
Asano, T.1
-
3
-
-
60349128962
-
Dynamic and efficient key management for access hierarchies
-
Article 18, Prelim. version in Proc. of ACM CCS 2005, 190-201
-
Atallah M.J., Blanton M., Fazio N., and Frikken K.B. Dynamic and efficient key management for access hierarchies. ACM Trans. Inf. Syst. Secur. 12 3 (2009) Article 18, Prelim. version in Proc. of ACM CCS 2005, 190-201
-
(2009)
ACM Trans. Inf. Syst. Secur.
, vol.12
, Issue.3
-
-
Atallah, M.J.1
Blanton, M.2
Fazio, N.3
Frikken, K.B.4
-
4
-
-
34547282859
-
Provably-secure time-bound hierarchical key assignment schemes, Rep
-
at
-
G. Ateniese, A. De Santis, A.L. Ferrara, B. Masucci, Provably-secure time-bound hierarchical key assignment schemes, Rep. 2006/225 at the IACR Cryptology ePrint Archive. Prelim. version in Proc. of ACM CCS 2006, pp. 288-297
-
the IACR Cryptology ePrint Archive. Prelim. version in Proc. of ACM
, vol.CCS 2006
-
-
Ateniese, G.1
De Santis, A.2
Ferrara, A.L.3
Masucci, B.4
-
6
-
-
84954147732
-
Applying hierarchical and role-based access control to XML documents
-
J. Crampton, Applying hierarchical and role-based access control to XML documents, in Proc. of ACM SWS 2004, pp. 37-46
-
Proc. of ACM
, vol.SWS 2004
, pp. 37-46
-
-
Crampton, J.1
-
7
-
-
5744237343
-
Cryptographic key assignment schemes for any access control policy
-
De Santis A., Ferrara A.L., and Masucci B. Cryptographic key assignment schemes for any access control policy. Inf. Proc. Lett. 92 4 (2004) 199-205
-
(2004)
Inf. Proc. Lett.
, vol.92
, Issue.4
, pp. 199-205
-
-
De Santis, A.1
Ferrara, A.L.2
Masucci, B.3
-
8
-
-
38049077460
-
Efficient provably-secure hierarchical key assignment schemes, Rep
-
at the IACR Cryptology ePrint Archive. Prelim. version in Proc. of MFCS
-
A. De Santis, A.L. Ferrara, B. Masucci, Efficient provably-secure hierarchical key assignment schemes, Rep. 2006/479 at the IACR Cryptology ePrint Archive. Prelim. version in Proc. of MFCS 2007, LNCS 4708, pp. 371-382
-
(2007)
LNCS
, vol.4708
-
-
De Santis, A.1
Ferrara, A.L.2
Masucci, B.3
-
9
-
-
0000857188
-
On the normal number of prime factors of φ{symbol} (n)
-
Erdo{double acute}s P., and Pomerance C. On the normal number of prime factors of φ{symbol} (n). Rocky Mountain J. Math. 15 (1985) 343-352
-
(1985)
Rocky Mountain J. Math.
, vol.15
, pp. 343-352
-
-
Erdos, P.1
Pomerance, C.2
-
11
-
-
0024868772
-
A hard-core predicate for all one-way functions
-
O. Goldreich, L. Levin, A hard-core predicate for all one-way functions, in: Proc. of ACM STOC 1989, pp. 25-32
-
Proc. of ACM
, vol.STOC 1989
, pp. 25-32
-
-
Goldreich, O.1
Levin, L.2
-
14
-
-
0000954459
-
A cryptographic key generation scheme for multilevel data security
-
Harn L., and Lin H.Y. A cryptographic key generation scheme for multilevel data security. Comput. Security 9 6 (1990) 539-546
-
(1990)
Comput. Security
, vol.9
, Issue.6
, pp. 539-546
-
-
Harn, L.1
Lin, H.Y.2
-
15
-
-
0000564361
-
A polynomial algorithm in linear programming
-
Khachiyan L. A polynomial algorithm in linear programming. Dokl. Akad. Nauk SSSR 24 (1979) 1093-1096
-
(1979)
Dokl. Akad. Nauk SSSR
, vol.24
, pp. 1093-1096
-
-
Khachiyan, L.1
-
16
-
-
2342477274
-
Efficient access control and key management schemes for mobile agents
-
Lin I.-C., Oub H.-H., and Hwang M.-S. Efficient access control and key management schemes for mobile agents. Comput. Stand. Interfaces 26 5 (2004) 423-433
-
(2004)
Comput. Stand. Interfaces
, vol.26
, Issue.5
, pp. 423-433
-
-
Lin, I.-C.1
Oub, H.-H.2
Hwang, M.-S.3
-
17
-
-
0022115074
-
An optimal algorithm for assigning cryptographic keys to control access in a hierarchy
-
MacKinnon S.J., Taylor P.D., Meijer H., and Akl S.G. An optimal algorithm for assigning cryptographic keys to control access in a hierarchy. IEEE Trans. Comput. C-34 9 (1985) 797-802
-
(1985)
IEEE Trans. Comput.
, vol.C-34
, Issue.9
, pp. 797-802
-
-
MacKinnon, S.J.1
Taylor, P.D.2
Meijer, H.3
Akl, S.G.4
-
18
-
-
0003614758
-
Digitalized Signatures and Public Key Functions as Intractable as Factorization
-
Tech. Rep. MIT/LCS/TR-212, MIT Lab. for Computer Science, 1979
-
M.O. Rabin, Digitalized Signatures and Public Key Functions as Intractable as Factorization, Tech. Rep. MIT/LCS/TR-212, MIT Lab. for Computer Science, 1979
-
-
-
Rabin, M.O.1
-
19
-
-
0017930809
-
A method for obtaining digital signatures and public key cryptosystems
-
Rivest R.L., Shamir A., and Adleman L. A method for obtaining digital signatures and public key cryptosystems. Commun. ACM 21 (1978) 120-126
-
(1978)
Commun. ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
20
-
-
38049015677
-
On the generation of cryptographically strong pseudorandom sequences
-
Shamir A. On the generation of cryptographically strong pseudorandom sequences. ACM Trans. Comput. Syst. 1 (1983) 38-44
-
(1983)
ACM Trans. Comput. Syst.
, vol.1
, pp. 38-44
-
-
Shamir, A.1
-
21
-
-
34247380378
-
A secure system for data access based on anonymous and time-dependent hierarchical keys
-
W.-G. Tzeng, A secure system for data access based on anonymous and time-dependent hierarchical keys, in: Proc. of ACM ASIACCS 2006, pp. 223-230
-
(2006)
Proc. of ACM ASIACCS
, pp. 223-230
-
-
Tzeng, W.-G.1
-
22
-
-
0013024890
-
A key assignment for enforcing access control policy exceptions
-
J.H. Yeh, R. Chow, R. Newman, A key assignment for enforcing access control policy exceptions, in: Proc. of Int. Symposium on Internet Technology, 1998, pp. 54-59
-
(1998)
Proc. of Int. Symposium on Internet Technology
, pp. 54-59
-
-
Yeh, J.H.1
Chow, R.2
Newman, R.3
-
23
-
-
32844471813
-
Merging: An efficient solution for a time-bound hierarchical key assignment scheme
-
Wang S.-Y., and Laih C.-S. Merging: An efficient solution for a time-bound hierarchical key assignment scheme. IEEE Trans. Dependable Secure Comput. 3 1 (2006)
-
(2006)
IEEE Trans. Dependable Secure Comput.
, vol.3
, Issue.1
-
-
Wang, S.-Y.1
Laih, C.-S.2
|