메뉴 건너뛰기




Volumn 29, Issue 5, 2010, Pages 533-547

Managing key hierarchies for access control enforcement: Heuristic approaches

Author keywords

Access control; Confidentiality; Data outsourcing; Encryption policy; Heuristics; Key hierarchies

Indexed keywords

CONFIDENTIALITY; DATA OUTSOURCING; ENCRYPTION POLICY; HEURISTICS; KEY HIERARCHY;

EID: 77955710442     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2009.12.006     Document Type: Article
Times cited : (19)

References (20)
  • 2
    • 84976752387 scopus 로고
    • Cryptographic solution to a problem of access control in a hierarchy
    • S. Akl, and P. Taylor Cryptographic solution to a problem of access control in a hierarchy ACM Transactions on Computer System 1 3 1983 239 248
    • (1983) ACM Transactions on Computer System , vol.1 , Issue.3 , pp. 239-248
    • Akl, S.1    Taylor, P.2
  • 3
    • 33745793594 scopus 로고    scopus 로고
    • Dynamic and efficient key management for access hierarchies
    • Alexandria, USA
    • Atallah M, Frikken K, Blanton M. Dynamic and efficient key management for access hierarchies. In: Proceedings of ACM CCS 2005, Alexandria, USA; 2005.
    • (2005) Proceedings of ACM CCS 2005
    • Atallah, M.1    Frikken, K.2    Blanton, M.3
  • 11
    • 5744237343 scopus 로고    scopus 로고
    • Cryptographic key assignment schemes for any access control policy
    • A. De Santis, A. Ferrara, and B. Masucci Cryptographic key assignment schemes for any access control policy Information Processing Letters 92 4 2004 199 205
    • (2004) Information Processing Letters , vol.92 , Issue.4 , pp. 199-205
    • De Santis, A.1    Ferrara, A.2    Masucci, B.3
  • 13
    • 0036361105 scopus 로고    scopus 로고
    • Executing SQL over encrypted data in the database-service-provider model
    • Madison, USA
    • Hacigümüs H, Iyer B, Mehrotra S, Li C. Executing SQL over encrypted data in the database-service-provider model. In: Proceedings of SIGMOD 2002, Madison, USA; 2002a.
    • (2002) Proceedings of SIGMOD 2002
    • Hacigümüs, H.1    Iyer, B.2    Mehrotra, S.3    Li, C.4
  • 15
    • 0022115074 scopus 로고
    • An optimal algorithm for assigning cryptographic keys to control access in a hierarchy
    • S. MacKinnon, P. Taylor, H. Meijer, and S. Akl An optimal algorithm for assigning cryptographic keys to control access in a hierarchy IEEE Transactions on Computers 34 9 1985 797 802
    • (1985) IEEE Transactions on Computers , vol.34 , Issue.9 , pp. 797-802
    • MacKinnon, S.1    Taylor, P.2    Meijer, H.3    Akl, S.4
  • 16
    • 85009120801 scopus 로고    scopus 로고
    • Controlling access to published data using cryptography
    • Berlin, Germany
    • Miklau G, Suciu D. Controlling access to published data using cryptography. In: Proceedings of the 29th VLDB Conference, Berlin, Germany; 2003.
    • (2003) Proceedings of the 29th VLDB Conference
    • Miklau, G.1    Suciu, D.2
  • 17
    • 0023962708 scopus 로고
    • Cryptographic implementation of a tree hierarchy for access control
    • R. Sandhu Cryptographic implementation of a tree hierarchy for access control Information Processing Letters 27 2 1988 95 98
    • (1988) Information Processing Letters , vol.27 , Issue.2 , pp. 95-98
    • Sandhu, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.