-
1
-
-
84976752387
-
Cryptographic solution to a problem of access control in a hierarchy
-
S.G. Akl, and P.D. Taylor Cryptographic solution to a problem of access control in a hierarchy ACM Transactions on Computer Systems 1 July 1983 239 248
-
(1983)
ACM Transactions on Computer Systems
, vol.1
, Issue.JULY
, pp. 239-248
-
-
Akl, S.G.1
Taylor, P.D.2
-
2
-
-
33745793594
-
Frikken, Marina Blanton, Dynamic and efficient key management for access hierarchies
-
November 2005
-
Mikhail J. Atallah, Keith B. Frikken, Marina Blanton, Dynamic and efficient key management for access hierarchies, in: Proceeding of the 12th ACM Conference on Computer and Communications Security (CCS 05), pp. 190-202, November 2005.
-
Proceeding of the 12th ACM Conference on Computer and Communications Security (CCS 05)
, pp. 190-202
-
-
Atallah, M.J.1
Keith, B.2
-
3
-
-
78649814681
-
Improving indirect key management scheme of access hierarchies
-
Brian J. Cacic, and Ruizhong Wei Improving indirect key management scheme of access hierarchies International Journal of Network Security (IJNS) 4 2 2007 128 137
-
(2007)
International Journal of Network Security (IJNS)
, vol.4
, Issue.2
, pp. 128-137
-
-
Cacic, B.J.1
Wei, R.2
-
4
-
-
10444280844
-
A novel key management scheme for dynamic access control in a user hierarchy
-
Tzer-Shyong Chen, and Jen-Yan Huang A novel key management scheme for dynamic access control in a user hierarchy Applied Mathematics and Computation 162 1 2005 339 351
-
(2005)
Applied Mathematics and Computation
, vol.162
, Issue.1
, pp. 339-351
-
-
Chen, T.-S.1
Huang, J.-Y.2
-
5
-
-
34948898634
-
Access control in user hierarchy based on elliptic curve cryptosystem
-
Yu-Fang Chung, Hsiu-Hui Lee, Feipei Lai, and Tzer-Shyong Chen Access control in user hierarchy based on elliptic curve cryptosystem Information Sciences 178 1 2008 230 243
-
(2008)
Information Sciences
, vol.178
, Issue.1
, pp. 230-243
-
-
Chung, Y.-F.1
Lee, H.-H.2
Lai, F.3
Chen, T.-S.4
-
6
-
-
0022583299
-
Views for multilevel database security
-
Oakland
-
Dorothy E. Denning, Selim G. Akl, Mattew Morgenstern, Peter G. Neumann, Roger R. Schell, Mark Heckman, Views for multilevel database security, in: Proceeding 1986 IEEE Symposium on Security and Privacy, pp. 156-172, Oakland, 1986.
-
(1986)
Proceeding 1986 IEEE Symposium on Security and Privacy
, pp. 156-172
-
-
Denning, D.E.1
Akl, S.G.2
Morgenstern, M.3
Neumann, P.G.4
Schell, R.R.5
Heckman, M.6
-
7
-
-
80054086407
-
A Cryptographic key assignment scheme for access control in poset ordered hierarchies with enhanced security
-
Debasis Giri, and P.D. Srivastava A Cryptographic key assignment scheme for access control in poset ordered hierarchies with enhanced security International Journal of Network Security (IJNS) 7 2 2008 123 234
-
(2008)
International Journal of Network Security (IJNS)
, vol.7
, Issue.2
, pp. 123-234
-
-
Giri, D.1
Srivastava, P.D.2
-
8
-
-
0000954459
-
A cryptographic key generation scheme for multilevel data security
-
Lein Harn, and Hung Yu Lin A cryptographic key generation scheme for multilevel data security Computers & Security 9 October 1990 539 546
-
(1990)
Computers & Security
, vol.9
, Issue.OCTOBER
, pp. 539-546
-
-
Harn, L.1
Lin, H.Y.2
-
9
-
-
0000370732
-
A new dynamic cryptographic key generation scheme in a hierarchy
-
Min-Shiang Hwang A new dynamic cryptographic key generation scheme in a hierarchy Nordic Journal of Computing 6 4 1999 363 371
-
(1999)
Nordic Journal of Computing
, vol.6
, Issue.4
, pp. 363-371
-
-
Hwang, M.-S.1
-
10
-
-
0033908596
-
Cryptanalysis of YCN key assignment scheme in a hierarchy
-
Min-Shiang Hwang Cryptanalysis of YCN key assignment scheme in a hierarchy Information Processing Letters 73 3 2000 97 101
-
(2000)
Information Processing Letters
, vol.73
, Issue.3
, pp. 97-101
-
-
Hwang, M.-S.1
-
11
-
-
0038053203
-
Controlling access in large partially ordered hierarchies using cryptographic keys
-
Min-Shiang Hwang, and Wei-Pang Yang Controlling access in large partially ordered hierarchies using cryptographic keys The Journal of Systems and Software 67 2 2003 99 107
-
(2003)
The Journal of Systems and Software
, vol.67
, Issue.2
, pp. 99-107
-
-
Hwang, M.-S.1
Yang, W.-P.2
-
14
-
-
77958593747
-
Activity-oriented access control to ubiquitous hospital information and services
-
Xuan Hung Le, Sungyoung Lee, Young-Koo Lee, Heejo Lee, Murad Khalid, and Ravi Sankar Activity-oriented access control to ubiquitous hospital information and services Information Sciences 180 16 2010 2979 2990
-
(2010)
Information Sciences
, vol.180
, Issue.16
, pp. 2979-2990
-
-
Le, X.H.1
Lee, S.2
Lee, Y.-K.3
Lee, H.4
Khalid, M.5
Sankar, R.6
-
15
-
-
71849103991
-
A function-based user authority delegation model
-
Malrey Lee, Nam-Deok Cho, and Thomas M. Gatton A function-based user authority delegation model Information Sciences 180 5 2010 765 775
-
(2010)
Information Sciences
, vol.180
, Issue.5
, pp. 765-775
-
-
Lee, M.1
Cho, N.-D.2
Gatton, T.M.3
-
16
-
-
0344089052
-
A new key assignment scheme for enforcing complicated access control policies in hierarchy
-
Iuon-Chung Lin, Min-Shiang Hwang, and Chin-Chen Chang A new key assignment scheme for enforcing complicated access control policies in hierarchy Future Generation Computer Systems 19 4 2003 457 462
-
(2003)
Future Generation Computer Systems
, vol.19
, Issue.4
, pp. 457-462
-
-
Lin, I.-C.1
Hwang, M.-S.2
Chang, C.-C.3
-
17
-
-
67349173961
-
A trust degree based access control in grid environments
-
Junzhou Luo, Xudong Ni, and Jianming Yong A trust degree based access control in grid environments Information Sciences 179 15 2009 2618 2628
-
(2009)
Information Sciences
, vol.179
, Issue.15
, pp. 2618-2628
-
-
Luo, J.1
Ni, X.2
Yong, J.3
-
18
-
-
0022115074
-
An optimal algorithm for assigning cryptographic keys to control access in a hierarchy
-
Stephen J. Mackinnon, Peter D. Taylor, Henk Meijer, and Selim G. Akl An optimal algorithm for assigning cryptographic keys to control access in a hierarchy IEEE Transactions on Computers 34 September 1985 797 802
-
(1985)
IEEE Transactions on Computers
, vol.34
, Issue.SEPTEMBER
, pp. 797-802
-
-
MacKinnon, S.J.1
Taylor, P.D.2
Meijer, H.3
Akl, S.G.4
-
20
-
-
0023962708
-
Cryptographic implementation of a tree hierarchy for access control
-
R.S. Sandhu Cryptographic implementation of a tree hierarchy for access control Information Processing Letters 27 1988 95 98
-
(1988)
Information Processing Letters
, vol.27
, pp. 95-98
-
-
Sandhu, R.S.1
-
21
-
-
33645890580
-
Enforcing the security of a time-bound hierarchical key assignment scheme
-
Alfredo De Santis, Anna Lisa Ferrara, and Barbara Masucci Enforcing the security of a time-bound hierarchical key assignment scheme Information Sciences 176 12 2006 1684 1694
-
(2006)
Information Sciences
, vol.176
, Issue.12
, pp. 1684-1694
-
-
De Santis, A.1
Lisa Ferrara, A.2
Masucci, B.3
-
22
-
-
33847696259
-
Access control in networks hierarchy: Implementation of key management protocol
-
Nicolas Sklavos, and Odysseas Koufopavlou Access control in networks hierarchy: implementation of key management protocol International Journal of Network Security 1 2 2005 103 109
-
(2005)
International Journal of Network Security
, vol.1
, Issue.2
, pp. 103-109
-
-
Sklavos, N.1
Koufopavlou, O.2
-
23
-
-
0036187601
-
A time-bound cryptographic key assignment scheme for access control in a hierarchy
-
W.G. Tzeng A time-bound cryptographic key assignment scheme for access control in a hierarchy IEEE Transactions on Knowledge and Data Engineering 14 January 2002 182 188
-
(2002)
IEEE Transactions on Knowledge and Data Engineering
, vol.14
, Issue.JANUARY
, pp. 182-188
-
-
Tzeng, W.G.1
-
24
-
-
9544234465
-
Cryptanalysis of Hwang-Yang scheme for controlling access in large partially ordered hierarchies
-
Shyh-Yih Wang, and Chi-Sung Laih Cryptanalysis of Hwang-Yang scheme for controlling access in large partially ordered hierarchies The Journal of Systems and Software 75 2005 189 192
-
(2005)
The Journal of Systems and Software
, vol.75
, pp. 189-192
-
-
Wang, S.-Y.1
Laih, C.-S.2
-
25
-
-
10644259523
-
Access control in a hierarchy using one-way hash functions
-
Cungang Yang, and Celia Li Access control in a hierarchy using one-way hash functions Computers & Security 23 8 2004 659 664
-
(2004)
Computers & Security
, vol.23
, Issue.8
, pp. 659-664
-
-
Yang, C.1
Li, C.2
-
26
-
-
0013024890
-
A key assignment for enforcing access control policy exceptions
-
Taipei
-
Jyh-haw Yeh, Randy Chow, Richard Newman, A key assignment for enforcing access control policy exceptions, in: Proceedings on International Symposium on Internet Technology, pp. 54-59, Taipei, 1998.
-
(1998)
Proceedings on International Symposium on Internet Technology
, pp. 54-59
-
-
Yeh J, -H.1
Chow, R.2
Newman, R.3
-
27
-
-
0037960156
-
Key assignment for enforcing access control policy exceptions in distributed systems
-
Jyh-haw Yeh, Randy Chow, and Richard Newman Key assignment for enforcing access control policy exceptions in distributed systems Information Sciences 152 2003 63 88
-
(2003)
Information Sciences
, vol.152
, pp. 63-88
-
-
Yeh J.-haw1
Chow, R.2
Newman, R.3
-
28
-
-
0041347682
-
Security of Tzeng's time-bound cryptographic key assignment scheme for access control in a hierarchy
-
X. Yi, and Y. Ye Security of Tzeng's time-bound cryptographic key assignment scheme for access control in a hierarchy IEEE Transactions on Knowledge and Data Engineering 15 July 2003 1054 1055
-
(2003)
IEEE Transactions on Knowledge and Data Engineering
, vol.15
, Issue.JULY
, pp. 1054-1055
-
-
Yi, X.1
Ye, Y.2
-
29
-
-
78649878982
-
A key management scheme for hierarchical access control in group communication
-
Qiong Zhang, Yuke Wang, and Jason P. Jue A key management scheme for hierarchical access control in group communication International Journal of Network Security (IJNS) 7 3 2008 323 334
-
(2008)
International Journal of Network Security (IJNS)
, vol.7
, Issue.3
, pp. 323-334
-
-
Zhang, Q.1
Wang, Y.2
Jue, J.P.3
|