메뉴 건너뛰기




Volumn 5, Issue , 2010, Pages

A hierarchical key management scheme in role-based access control

Author keywords

Elliptic curve; Hierarchical role; Key management; Role based access control

Indexed keywords

ELLIPTIC CURVE; HIERARCHICAL KEY MANAGEMENT; HIERARCHICAL KEY MANAGEMENT SCHEME; HIERARCHICAL MANAGEMENT; HIERARCHICAL ROLE; KEY MANAGEMENT; MASTER KEY; RBAC MODEL; ROLE-BASED ACCESS CONTROL; ROLE-BASED ACCESS CONTROL MODEL; SAFETY PERFORMANCE;

EID: 77955895393     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICCDA.2010.5541164     Document Type: Conference Paper
Times cited : (2)

References (5)
  • 1
    • 84976752387 scopus 로고
    • Cryptogrphic solution of access control in hierarchy
    • Akl S G and Taylor P D, "Cryptogrphic solution of access control in hierarchy", ACM Transactions on Computer Systems. vol. 1(3), pp.239-248, 1983
    • (1983) ACM Transactions on Computer Systems , vol.1 , Issue.3 , pp. 239-248
    • Akl, S.G.1    Taylor, P.D.2
  • 2
    • 0036187601 scopus 로고    scopus 로고
    • A time-bound cryptographic key assignmem scheme for access control in a hierarchy
    • Tzeng W G, "A time-bound cryptographic key assignmem scheme for access control in a hierarchy", IEEE Trans Knowled Date Eng. vol. 14(1), pp.182-188, 2002
    • (2002) IEEE Trans Knowled Date Eng , vol.14 , Issue.1 , pp. 182-188
    • Tzeng, W.G.1
  • 4
    • 77955898115 scopus 로고    scopus 로고
    • Secure Multicast Communications
    • Zheng Li, "Secure Multicast Communications", University of Regina, vol. 07, 2003.
    • (2003) University of Regina , vol.7
    • Zheng, L.1
  • 5
    • 0033893174 scopus 로고    scopus 로고
    • Secure Group Communications Using Key Graphs
    • Wong C, Gouda M, Lam S, "Secure Group Communications Using Key Graphs", IEEE/ACM Trans. on Networking,. vol. 8(1), pp. 16-30, 2000.
    • (2000) IEEE/ACM Trans. on Networking , vol.8 , Issue.1 , pp. 16-30
    • Wong, C.1    Gouda, M.2    Lam, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.