메뉴 건너뛰기




Volumn 181, Issue 4, 2011, Pages 917-925

An efficient key assignment scheme for access control in a large leaf class hierarchy

Author keywords

Access control; Cryptography; Data security; Hierarchy; Key management

Indexed keywords

ACCESS RIGHTS; CLASS HIERARCHIES; DATA SECURITY; HIERARCHY; KEY ASSIGNMENT SCHEMES; KEY GENERATION; KEY MANAGEMENT; PARTIALLY ORDERED SET;

EID: 78649817331     PISSN: 00200255     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ins.2010.09.033     Document Type: Article
Times cited : (22)

References (30)
  • 1
    • 84976752387 scopus 로고
    • Cryptographic solution to a problem of access control in a hierarchy
    • S.G. Akl, and P.D. Taylor Cryptographic solution to a problem of access control in a hierarchy ACM Transactions on Computer Systems 1 July 1983 239 248
    • (1983) ACM Transactions on Computer Systems , vol.1 , Issue.JULY , pp. 239-248
    • Akl, S.G.1    Taylor, P.D.2
  • 3
    • 78649814681 scopus 로고    scopus 로고
    • Improving indirect key management scheme of access hierarchies
    • Brian J. Cacic, and Ruizhong Wei Improving indirect key management scheme of access hierarchies International Journal of Network Security (IJNS) 4 2 2007 128 137
    • (2007) International Journal of Network Security (IJNS) , vol.4 , Issue.2 , pp. 128-137
    • Cacic, B.J.1    Wei, R.2
  • 4
    • 10444280844 scopus 로고    scopus 로고
    • A novel key management scheme for dynamic access control in a user hierarchy
    • Tzer-Shyong Chen, and Jen-Yan Huang A novel key management scheme for dynamic access control in a user hierarchy Applied Mathematics and Computation 162 1 2005 339 351
    • (2005) Applied Mathematics and Computation , vol.162 , Issue.1 , pp. 339-351
    • Chen, T.-S.1    Huang, J.-Y.2
  • 5
    • 34948898634 scopus 로고    scopus 로고
    • Access control in user hierarchy based on elliptic curve cryptosystem
    • Yu-Fang Chung, Hsiu-Hui Lee, Feipei Lai, and Tzer-Shyong Chen Access control in user hierarchy based on elliptic curve cryptosystem Information Sciences 178 1 2008 230 243
    • (2008) Information Sciences , vol.178 , Issue.1 , pp. 230-243
    • Chung, Y.-F.1    Lee, H.-H.2    Lai, F.3    Chen, T.-S.4
  • 7
    • 80054086407 scopus 로고    scopus 로고
    • A Cryptographic key assignment scheme for access control in poset ordered hierarchies with enhanced security
    • Debasis Giri, and P.D. Srivastava A Cryptographic key assignment scheme for access control in poset ordered hierarchies with enhanced security International Journal of Network Security (IJNS) 7 2 2008 123 234
    • (2008) International Journal of Network Security (IJNS) , vol.7 , Issue.2 , pp. 123-234
    • Giri, D.1    Srivastava, P.D.2
  • 8
    • 0000954459 scopus 로고
    • A cryptographic key generation scheme for multilevel data security
    • Lein Harn, and Hung Yu Lin A cryptographic key generation scheme for multilevel data security Computers & Security 9 October 1990 539 546
    • (1990) Computers & Security , vol.9 , Issue.OCTOBER , pp. 539-546
    • Harn, L.1    Lin, H.Y.2
  • 9
    • 0000370732 scopus 로고    scopus 로고
    • A new dynamic cryptographic key generation scheme in a hierarchy
    • Min-Shiang Hwang A new dynamic cryptographic key generation scheme in a hierarchy Nordic Journal of Computing 6 4 1999 363 371
    • (1999) Nordic Journal of Computing , vol.6 , Issue.4 , pp. 363-371
    • Hwang, M.-S.1
  • 10
    • 0033908596 scopus 로고    scopus 로고
    • Cryptanalysis of YCN key assignment scheme in a hierarchy
    • Min-Shiang Hwang Cryptanalysis of YCN key assignment scheme in a hierarchy Information Processing Letters 73 3 2000 97 101
    • (2000) Information Processing Letters , vol.73 , Issue.3 , pp. 97-101
    • Hwang, M.-S.1
  • 11
    • 0038053203 scopus 로고    scopus 로고
    • Controlling access in large partially ordered hierarchies using cryptographic keys
    • Min-Shiang Hwang, and Wei-Pang Yang Controlling access in large partially ordered hierarchies using cryptographic keys The Journal of Systems and Software 67 2 2003 99 107
    • (2003) The Journal of Systems and Software , vol.67 , Issue.2 , pp. 99-107
    • Hwang, M.-S.1    Yang, W.-P.2
  • 14
    • 77958593747 scopus 로고    scopus 로고
    • Activity-oriented access control to ubiquitous hospital information and services
    • Xuan Hung Le, Sungyoung Lee, Young-Koo Lee, Heejo Lee, Murad Khalid, and Ravi Sankar Activity-oriented access control to ubiquitous hospital information and services Information Sciences 180 16 2010 2979 2990
    • (2010) Information Sciences , vol.180 , Issue.16 , pp. 2979-2990
    • Le, X.H.1    Lee, S.2    Lee, Y.-K.3    Lee, H.4    Khalid, M.5    Sankar, R.6
  • 15
    • 71849103991 scopus 로고    scopus 로고
    • A function-based user authority delegation model
    • Malrey Lee, Nam-Deok Cho, and Thomas M. Gatton A function-based user authority delegation model Information Sciences 180 5 2010 765 775
    • (2010) Information Sciences , vol.180 , Issue.5 , pp. 765-775
    • Lee, M.1    Cho, N.-D.2    Gatton, T.M.3
  • 16
    • 0344089052 scopus 로고    scopus 로고
    • A new key assignment scheme for enforcing complicated access control policies in hierarchy
    • Iuon-Chung Lin, Min-Shiang Hwang, and Chin-Chen Chang A new key assignment scheme for enforcing complicated access control policies in hierarchy Future Generation Computer Systems 19 4 2003 457 462
    • (2003) Future Generation Computer Systems , vol.19 , Issue.4 , pp. 457-462
    • Lin, I.-C.1    Hwang, M.-S.2    Chang, C.-C.3
  • 17
    • 67349173961 scopus 로고    scopus 로고
    • A trust degree based access control in grid environments
    • Junzhou Luo, Xudong Ni, and Jianming Yong A trust degree based access control in grid environments Information Sciences 179 15 2009 2618 2628
    • (2009) Information Sciences , vol.179 , Issue.15 , pp. 2618-2628
    • Luo, J.1    Ni, X.2    Yong, J.3
  • 18
    • 0022115074 scopus 로고
    • An optimal algorithm for assigning cryptographic keys to control access in a hierarchy
    • Stephen J. Mackinnon, Peter D. Taylor, Henk Meijer, and Selim G. Akl An optimal algorithm for assigning cryptographic keys to control access in a hierarchy IEEE Transactions on Computers 34 September 1985 797 802
    • (1985) IEEE Transactions on Computers , vol.34 , Issue.SEPTEMBER , pp. 797-802
    • MacKinnon, S.J.1    Taylor, P.D.2    Meijer, H.3    Akl, S.G.4
  • 20
    • 0023962708 scopus 로고
    • Cryptographic implementation of a tree hierarchy for access control
    • R.S. Sandhu Cryptographic implementation of a tree hierarchy for access control Information Processing Letters 27 1988 95 98
    • (1988) Information Processing Letters , vol.27 , pp. 95-98
    • Sandhu, R.S.1
  • 21
    • 33645890580 scopus 로고    scopus 로고
    • Enforcing the security of a time-bound hierarchical key assignment scheme
    • Alfredo De Santis, Anna Lisa Ferrara, and Barbara Masucci Enforcing the security of a time-bound hierarchical key assignment scheme Information Sciences 176 12 2006 1684 1694
    • (2006) Information Sciences , vol.176 , Issue.12 , pp. 1684-1694
    • De Santis, A.1    Lisa Ferrara, A.2    Masucci, B.3
  • 22
    • 33847696259 scopus 로고    scopus 로고
    • Access control in networks hierarchy: Implementation of key management protocol
    • Nicolas Sklavos, and Odysseas Koufopavlou Access control in networks hierarchy: implementation of key management protocol International Journal of Network Security 1 2 2005 103 109
    • (2005) International Journal of Network Security , vol.1 , Issue.2 , pp. 103-109
    • Sklavos, N.1    Koufopavlou, O.2
  • 23
    • 0036187601 scopus 로고    scopus 로고
    • A time-bound cryptographic key assignment scheme for access control in a hierarchy
    • W.G. Tzeng A time-bound cryptographic key assignment scheme for access control in a hierarchy IEEE Transactions on Knowledge and Data Engineering 14 January 2002 182 188
    • (2002) IEEE Transactions on Knowledge and Data Engineering , vol.14 , Issue.JANUARY , pp. 182-188
    • Tzeng, W.G.1
  • 24
    • 9544234465 scopus 로고    scopus 로고
    • Cryptanalysis of Hwang-Yang scheme for controlling access in large partially ordered hierarchies
    • Shyh-Yih Wang, and Chi-Sung Laih Cryptanalysis of Hwang-Yang scheme for controlling access in large partially ordered hierarchies The Journal of Systems and Software 75 2005 189 192
    • (2005) The Journal of Systems and Software , vol.75 , pp. 189-192
    • Wang, S.-Y.1    Laih, C.-S.2
  • 25
    • 10644259523 scopus 로고    scopus 로고
    • Access control in a hierarchy using one-way hash functions
    • Cungang Yang, and Celia Li Access control in a hierarchy using one-way hash functions Computers & Security 23 8 2004 659 664
    • (2004) Computers & Security , vol.23 , Issue.8 , pp. 659-664
    • Yang, C.1    Li, C.2
  • 27
    • 0037960156 scopus 로고    scopus 로고
    • Key assignment for enforcing access control policy exceptions in distributed systems
    • Jyh-haw Yeh, Randy Chow, and Richard Newman Key assignment for enforcing access control policy exceptions in distributed systems Information Sciences 152 2003 63 88
    • (2003) Information Sciences , vol.152 , pp. 63-88
    • Yeh J.-haw1    Chow, R.2    Newman, R.3
  • 28
    • 0041347682 scopus 로고    scopus 로고
    • Security of Tzeng's time-bound cryptographic key assignment scheme for access control in a hierarchy
    • X. Yi, and Y. Ye Security of Tzeng's time-bound cryptographic key assignment scheme for access control in a hierarchy IEEE Transactions on Knowledge and Data Engineering 15 July 2003 1054 1055
    • (2003) IEEE Transactions on Knowledge and Data Engineering , vol.15 , Issue.JULY , pp. 1054-1055
    • Yi, X.1    Ye, Y.2
  • 29
    • 78649878982 scopus 로고    scopus 로고
    • A key management scheme for hierarchical access control in group communication
    • Qiong Zhang, Yuke Wang, and Jason P. Jue A key management scheme for hierarchical access control in group communication International Journal of Network Security (IJNS) 7 3 2008 323 334
    • (2008) International Journal of Network Security (IJNS) , vol.7 , Issue.3 , pp. 323-334
    • Zhang, Q.1    Wang, Y.2    Jue, J.P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.