-
1
-
-
43649085957
-
-
Trusted Platform Module. https://www.trustedcomputinggroup.org/ groups/tpm/, 2007.
-
(2007)
Trusted Platform Module
-
-
-
3
-
-
84976752387
-
Cryptographic solution to a problem of access control in a hierarchy
-
March
-
S. G. Akl and P. D. Taylor. Cryptographic solution to a problem of access control in a hierarchy. ACM Transactions on Computer Systems, 1(3):239-247, March 1983.
-
(1983)
ACM Transactions on Computer Systems
, vol.1
, Issue.3
, pp. 239-247
-
-
Akl, S.G.1
Taylor, P.D.2
-
4
-
-
33745793594
-
Dynamic and efficient key management for access hierarchies
-
November
-
M. J. Atallah, K. B. Frikken, and M. Blanton. Dynamic and efficient key management for access hierarchies. ACM CCS'05, pages 190-202, November 2005.
-
(2005)
ACM CCS'05
, pp. 190-202
-
-
Atallah, M.J.1
Frikken, K.B.2
Blanton, M.3
-
6
-
-
18744363342
-
A novel key management scheme for dynamic access control in a user hierarchy
-
September
-
Tzer-Shyong Chen, Yu-Fang Chung, and Chang-Sin Tian. A novel key management scheme for dynamic access control in a user hierarchy. In COMPSAC, pages 396-397, September 2004.
-
(2004)
COMPSAC
, pp. 396-397
-
-
Chen, T.-S.1
Chung, Y.-F.2
Tian, C.-S.3
-
7
-
-
84894043862
-
Flexible access control with master keys
-
Proceedings on Advances in Cryptology: CRYPTO '89
-
G. C. Chick and S. E. Tavares. Flexible access control with master keys. Proceedings on Advances in Cryptology: CRYPTO '89, LNCS, 435:316-322, 1989.
-
(1989)
LNCS
, vol.435
, pp. 316-322
-
-
Chick, G.C.1
Tavares, S.E.2
-
8
-
-
13844281059
-
Efficient time-bound hierarchical key assignment scheme
-
October
-
H.Y. Chien. Efficient time-bound hierarchical key assignment scheme. IEEE Trans. Knowledge and Data Eng., 16(10):1302-1304, October 2004.
-
(2004)
IEEE Trans. Knowledge and Data Eng
, vol.16
, Issue.10
, pp. 1302-1304
-
-
Chien, H.Y.1
-
9
-
-
33745792230
-
Hierarchical key management scheme using polynomial interpolation
-
January
-
M. L. Das, A. Saxena, V. P. Gulati, and D. B. Phatak. Hierarchical key management scheme using polynomial interpolation. SIGOPS Operating Systems Review, 39(1):40-47, January 2005.
-
(2005)
SIGOPS Operating Systems Review
, vol.39
, Issue.1
, pp. 40-47
-
-
Das, M.L.1
Saxena, A.2
Gulati, V.P.3
Phatak, D.B.4
-
10
-
-
0000954459
-
A cryptographic key generation scheme for multilevel data security
-
October
-
L. Harn and H. Y Lin. A cryptographic key generation scheme for multilevel data security. Computers and Security, 9(6):539-546, October 1990.
-
(1990)
Computers and Security
, vol.9
, Issue.6
, pp. 539-546
-
-
Harn, L.1
Lin, H.Y.2
-
11
-
-
58149257571
-
An efficient key assignment for access control in large partially ordered hierarchy
-
February
-
M.-S. Hwang, C.-H. Liu, and J.-W. Lo. An efficient key assignment for access control in large partially ordered hierarchy. Journal of Systems and Software, February 2004.
-
(2004)
Journal of Systems and Software
-
-
Hwang, M.-S.1
Liu, C.-H.2
Lo, J.-W.3
-
12
-
-
0031344109
-
Dynamic key management schemes for access control in a hierarchy
-
C. H. Lin. Dynamic key management schemes for access control in a hierarchy. Computer Communications, 20:1381-1385, 1997.
-
(1997)
Computer Communications
, vol.20
, pp. 1381-1385
-
-
Lin, C.H.1
-
13
-
-
0022115074
-
An optimal algorithm for assigning cryptographic keys to control access in a hierarchy
-
September
-
S. T. Mackinnon, P. D. Taylor, H. Meijer, and S. G. Akl. An optimal algorithm for assigning cryptographic keys to control access in a hierarchy. IEEE Transactions on Computers, 34(9):797-802, September 1985.
-
(1985)
IEEE Transactions on Computers
, vol.34
, Issue.9
, pp. 797-802
-
-
Mackinnon, S.T.1
Taylor, P.D.2
Meijer, H.3
Akl, S.G.4
-
15
-
-
0023962708
-
Cryptographic implementation of a tree hierarchy for access control
-
R. S. Sandhu. Cryptographic implementation of a tree hierarchy for access control. Information Processing Letters, 27:95-98, 1988.
-
(1988)
Information Processing Letters
, vol.27
, pp. 95-98
-
-
Sandhu, R.S.1
-
16
-
-
0036222059
-
A novel key management scheme based on discrete logarithms and polynomial interpolations
-
March
-
Victor R. L. Shen and Tzer-Shyong Chen. A novel key management scheme based on discrete logarithms and polynomial interpolations. Computers and Security, 21(2):164-171, March 2002.
-
(2002)
Computers and Security
, vol.21
, Issue.2
, pp. 164-171
-
-
Shen, V.R.L.1
Chen, T.-S.2
-
18
-
-
0036187601
-
IEEE Trans. Knowledge and Data Eng., Proc. Sixth ACM Symp. Access Control Models and Technologies (SACMAT '01)
-
182-188
-
W.G. Tzeng. A time-bound cryptographic key assignment scheme for access control in a hierarchy. IEEE Trans. Knowledge and Data Eng., Proc. Sixth ACM Symp. Access Control Models and Technologies (SACMAT '01), 14(1):182-188, 2002.
-
(2002)
, vol.14
, Issue.1
-
-
Tzeng, W.G.1
-
20
-
-
33947655924
-
Security of chien's efficient time-bound key assignment scheme for access control in a hierarchy
-
September
-
X. Yi. Security of chien's efficient time-bound key assignment scheme for access control in a hierarchy. IEEE Trans. Knowledge and Data Eng., 17(9):1298-1299, September 2005.
-
(2005)
IEEE Trans. Knowledge and Data Eng
, vol.17
, Issue.9
, pp. 1298-1299
-
-
Yi, X.1
-
21
-
-
0041347682
-
Security of tzeng's time-bound key assignment scheme for access control in a hierarchy
-
X. Yi and Y. Ye. Security of tzeng's time-bound key assignment scheme for access control in a hierarchy. IEEE Trans. Knowledge and Data Eng., 15(4):1054-1055, 2003.
-
(2003)
IEEE Trans. Knowledge and Data Eng
, vol.15
, Issue.4
, pp. 1054-1055
-
-
Yi, X.1
Ye, Y.2
-
22
-
-
0036920852
-
A practical key management scheme for access control in a user hierarchy
-
November
-
S. Zhong. A practical key management scheme for access control in a user hierarchy. Computers and Security, 21(8):750-759, November 2002.
-
(2002)
Computers and Security
, vol.21
, Issue.8
, pp. 750-759
-
-
Zhong, S.1
-
23
-
-
51349114288
-
A practical and flexible key management mechanism for trusted collaborative computing
-
X. Zou, Y. Dai, and E. Bertino. A practical and flexible key management mechanism for trusted collaborative computing. Proceedings of INFOCOM'08, pages 538-546, 2008.
-
(2008)
Proceedings of INFOCOM'08
, pp. 538-546
-
-
Zou, X.1
Dai, Y.2
Bertino, E.3
-
24
-
-
84956999112
-
Chinese Remainder Theorem based hierarchical access control for secure group communications
-
November
-
X. Zou, B. Ramamurthy, and S. Magliveras. Chinese Remainder Theorem based hierarchical access control for secure group communications. Lecture Notes in Computer Science (LNCS), Springer-Verlag (International Conference on Information and Communication Security), 2229:381-385, November 2001.
-
(2001)
Lecture Notes in Computer Science (LNCS), Springer-Verlag (International Conference on Information and Communication Security)
, vol.2229
, pp. 381-385
-
-
Zou, X.1
Ramamurthy, B.2
Magliveras, S.3
|