메뉴 건너뛰기




Volumn , Issue , 2009, Pages 279-286

An efficient time-bound access control scheme for dynamic access hierarchy

Author keywords

Dynamicity; Hierarchical access control; Tamper resistant; Time bound hierarchical key management

Indexed keywords

ACCESS CONTROL SCHEMES; COLLUDING ATTACK; CRYPTOGRAPHIC KEY; HIERARCHICAL ACCESS CONTROL; HIERARCHICAL KEY MANAGEMENT; KEY GENERATION; MULTICASTS; SECURE GROUP COMMUNICATIONS; SUBSCRIPTION PERIOD; TAMPER-RESISTANT; USER SUBSCRIPTION;

EID: 77949972714     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MSN.2009.51     Document Type: Conference Paper
Times cited : (7)

References (24)
  • 1
    • 43649085957 scopus 로고    scopus 로고
    • Trusted Platform Module. https://www.trustedcomputinggroup.org/ groups/tpm/, 2007.
    • (2007) Trusted Platform Module
  • 3
    • 84976752387 scopus 로고
    • Cryptographic solution to a problem of access control in a hierarchy
    • March
    • S. G. Akl and P. D. Taylor. Cryptographic solution to a problem of access control in a hierarchy. ACM Transactions on Computer Systems, 1(3):239-247, March 1983.
    • (1983) ACM Transactions on Computer Systems , vol.1 , Issue.3 , pp. 239-247
    • Akl, S.G.1    Taylor, P.D.2
  • 4
    • 33745793594 scopus 로고    scopus 로고
    • Dynamic and efficient key management for access hierarchies
    • November
    • M. J. Atallah, K. B. Frikken, and M. Blanton. Dynamic and efficient key management for access hierarchies. ACM CCS'05, pages 190-202, November 2005.
    • (2005) ACM CCS'05 , pp. 190-202
    • Atallah, M.J.1    Frikken, K.B.2    Blanton, M.3
  • 6
    • 18744363342 scopus 로고    scopus 로고
    • A novel key management scheme for dynamic access control in a user hierarchy
    • September
    • Tzer-Shyong Chen, Yu-Fang Chung, and Chang-Sin Tian. A novel key management scheme for dynamic access control in a user hierarchy. In COMPSAC, pages 396-397, September 2004.
    • (2004) COMPSAC , pp. 396-397
    • Chen, T.-S.1    Chung, Y.-F.2    Tian, C.-S.3
  • 7
    • 84894043862 scopus 로고
    • Flexible access control with master keys
    • Proceedings on Advances in Cryptology: CRYPTO '89
    • G. C. Chick and S. E. Tavares. Flexible access control with master keys. Proceedings on Advances in Cryptology: CRYPTO '89, LNCS, 435:316-322, 1989.
    • (1989) LNCS , vol.435 , pp. 316-322
    • Chick, G.C.1    Tavares, S.E.2
  • 8
    • 13844281059 scopus 로고    scopus 로고
    • Efficient time-bound hierarchical key assignment scheme
    • October
    • H.Y. Chien. Efficient time-bound hierarchical key assignment scheme. IEEE Trans. Knowledge and Data Eng., 16(10):1302-1304, October 2004.
    • (2004) IEEE Trans. Knowledge and Data Eng , vol.16 , Issue.10 , pp. 1302-1304
    • Chien, H.Y.1
  • 9
    • 33745792230 scopus 로고    scopus 로고
    • Hierarchical key management scheme using polynomial interpolation
    • January
    • M. L. Das, A. Saxena, V. P. Gulati, and D. B. Phatak. Hierarchical key management scheme using polynomial interpolation. SIGOPS Operating Systems Review, 39(1):40-47, January 2005.
    • (2005) SIGOPS Operating Systems Review , vol.39 , Issue.1 , pp. 40-47
    • Das, M.L.1    Saxena, A.2    Gulati, V.P.3    Phatak, D.B.4
  • 10
    • 0000954459 scopus 로고
    • A cryptographic key generation scheme for multilevel data security
    • October
    • L. Harn and H. Y Lin. A cryptographic key generation scheme for multilevel data security. Computers and Security, 9(6):539-546, October 1990.
    • (1990) Computers and Security , vol.9 , Issue.6 , pp. 539-546
    • Harn, L.1    Lin, H.Y.2
  • 11
    • 58149257571 scopus 로고    scopus 로고
    • An efficient key assignment for access control in large partially ordered hierarchy
    • February
    • M.-S. Hwang, C.-H. Liu, and J.-W. Lo. An efficient key assignment for access control in large partially ordered hierarchy. Journal of Systems and Software, February 2004.
    • (2004) Journal of Systems and Software
    • Hwang, M.-S.1    Liu, C.-H.2    Lo, J.-W.3
  • 12
    • 0031344109 scopus 로고    scopus 로고
    • Dynamic key management schemes for access control in a hierarchy
    • C. H. Lin. Dynamic key management schemes for access control in a hierarchy. Computer Communications, 20:1381-1385, 1997.
    • (1997) Computer Communications , vol.20 , pp. 1381-1385
    • Lin, C.H.1
  • 13
    • 0022115074 scopus 로고
    • An optimal algorithm for assigning cryptographic keys to control access in a hierarchy
    • September
    • S. T. Mackinnon, P. D. Taylor, H. Meijer, and S. G. Akl. An optimal algorithm for assigning cryptographic keys to control access in a hierarchy. IEEE Transactions on Computers, 34(9):797-802, September 1985.
    • (1985) IEEE Transactions on Computers , vol.34 , Issue.9 , pp. 797-802
    • Mackinnon, S.T.1    Taylor, P.D.2    Meijer, H.3    Akl, S.G.4
  • 15
    • 0023962708 scopus 로고
    • Cryptographic implementation of a tree hierarchy for access control
    • R. S. Sandhu. Cryptographic implementation of a tree hierarchy for access control. Information Processing Letters, 27:95-98, 1988.
    • (1988) Information Processing Letters , vol.27 , pp. 95-98
    • Sandhu, R.S.1
  • 16
    • 0036222059 scopus 로고    scopus 로고
    • A novel key management scheme based on discrete logarithms and polynomial interpolations
    • March
    • Victor R. L. Shen and Tzer-Shyong Chen. A novel key management scheme based on discrete logarithms and polynomial interpolations. Computers and Security, 21(2):164-171, March 2002.
    • (2002) Computers and Security , vol.21 , Issue.2 , pp. 164-171
    • Shen, V.R.L.1    Chen, T.-S.2
  • 18
    • 0036187601 scopus 로고    scopus 로고
    • IEEE Trans. Knowledge and Data Eng., Proc. Sixth ACM Symp. Access Control Models and Technologies (SACMAT '01)
    • 182-188
    • W.G. Tzeng. A time-bound cryptographic key assignment scheme for access control in a hierarchy. IEEE Trans. Knowledge and Data Eng., Proc. Sixth ACM Symp. Access Control Models and Technologies (SACMAT '01), 14(1):182-188, 2002.
    • (2002) , vol.14 , Issue.1
    • Tzeng, W.G.1
  • 19
    • 0029277753 scopus 로고
    • Fast algorithms for luc digital signature computation
    • S.M. Yen and C.S. Laih. Fast algorithms for luc digital signature computation. Proc. IEEE Computers and Digital Technology, 142(2):165-169, 1995.
    • (1995) Proc. IEEE Computers and Digital Technology , vol.142 , Issue.2 , pp. 165-169
    • Yen, S.M.1    Laih, C.S.2
  • 20
    • 33947655924 scopus 로고    scopus 로고
    • Security of chien's efficient time-bound key assignment scheme for access control in a hierarchy
    • September
    • X. Yi. Security of chien's efficient time-bound key assignment scheme for access control in a hierarchy. IEEE Trans. Knowledge and Data Eng., 17(9):1298-1299, September 2005.
    • (2005) IEEE Trans. Knowledge and Data Eng , vol.17 , Issue.9 , pp. 1298-1299
    • Yi, X.1
  • 21
    • 0041347682 scopus 로고    scopus 로고
    • Security of tzeng's time-bound key assignment scheme for access control in a hierarchy
    • X. Yi and Y. Ye. Security of tzeng's time-bound key assignment scheme for access control in a hierarchy. IEEE Trans. Knowledge and Data Eng., 15(4):1054-1055, 2003.
    • (2003) IEEE Trans. Knowledge and Data Eng , vol.15 , Issue.4 , pp. 1054-1055
    • Yi, X.1    Ye, Y.2
  • 22
    • 0036920852 scopus 로고    scopus 로고
    • A practical key management scheme for access control in a user hierarchy
    • November
    • S. Zhong. A practical key management scheme for access control in a user hierarchy. Computers and Security, 21(8):750-759, November 2002.
    • (2002) Computers and Security , vol.21 , Issue.8 , pp. 750-759
    • Zhong, S.1
  • 23
    • 51349114288 scopus 로고    scopus 로고
    • A practical and flexible key management mechanism for trusted collaborative computing
    • X. Zou, Y. Dai, and E. Bertino. A practical and flexible key management mechanism for trusted collaborative computing. Proceedings of INFOCOM'08, pages 538-546, 2008.
    • (2008) Proceedings of INFOCOM'08 , pp. 538-546
    • Zou, X.1    Dai, Y.2    Bertino, E.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.