-
1
-
-
84976752387
-
Cryptographic solution to a problem of access control in a hierarchy
-
S. G. Akl and P. D. Taylor, "Cryptographic solution to a problem of access control in a hierarchy," ACM Transactions on Computer Systems, vol. 1, pp. 239-248, 1983.
-
(1983)
ACM Transactions on Computer Systems
, vol.1
, pp. 239-248
-
-
Akl, S.G.1
Taylor, P.D.2
-
2
-
-
80054061336
-
An access control system with time-constraintusing support vector machines
-
Chin-Chen Chang, Iuon-Chang Lin, and Chia-Te Liao, "An access control system with time-constraintusing support vector machines," International Journal of Network Security, vol. 2, no. 2, pp. 150-159, 2006.
-
(2006)
International Journal of Network Security
, vol.2
, Issue.2
, pp. 150-159
-
-
Chin-Chen, C.1
Iuon-Chang, L.2
Chia-Te, L.3
-
3
-
-
0036396975
-
Hierarchical access control based on chinese remainder theorem and symmetric algorithm
-
T. S. Chen and Y. F. Chung, "Hierarchical access control based on chinese remainder theorem and symmetric algorithm," Computers & Security, vol. 21, no. 6, pp. 565-570, 2002.
-
(2002)
Computers & Security
, vol.21
, Issue.6
, pp. 565-570
-
-
Chen, T.S.1
Chung, Y.F.2
-
5
-
-
44549087923
-
An asymmetric cryptographic key assignment scheme for access control in tree structural hierarchies
-
Debasis Giri and P. D. Srivastava, "An asymmetric cryptographic key assignment scheme for access control in tree structural hierarchies," International Journal of Network Security, vol. 4, no. 3, pp. 348-354, 2007.
-
(2007)
International Journal of Network Security
, vol.4
, Issue.3
, pp. 348-354
-
-
Giri, D.1
Srivastava, P.D.2
-
6
-
-
80054086407
-
A cryptographic key assignment scheme for access control in poset ordered hierarchies with enhanced security
-
Debasis Giri and P. D. Srivastava, "A cryptographic key assignment scheme for access control in poset ordered hierarchies with enhanced security," International Journal of Network Security, vol. 7, no. 2, pp. 223-234, 2008.
-
(2008)
International Journal of Network Security
, vol.7
, Issue.2
, pp. 223-234
-
-
Debasis Giri, P.D.1
Srivastava, K.I.2
-
7
-
-
0032663530
-
Extension of CHW cryptographic key assignment scheme in a hierarchy
-
M. S. Hwang, "Extension of CHW cryptographic key assignment scheme in a hierarchy," IEE Proceedings Computers and Digital Techniques, vol. 146, no. 4, pp. 219, 1999.
-
(1999)
IEE Proceedings Computers and Digital Techniques
, vol.146
, Issue.4
, pp. 219
-
-
Hwang, M.S.1
-
8
-
-
0033751899
-
An asymmetric cryptographic scheme for a totally-ordered hierarchy
-
M. S. Hwang, "An asymmetric cryptographic scheme for a totally-ordered hierarchy," International Journal of Computer Mathematics, vol. 73, pp. 463-468, 2000.
-
(2000)
International Journal of Computer Mathematics
, vol.73
, pp. 463-468
-
-
Hwang, M.S.1
-
9
-
-
0033908596
-
Cryptanalysis of YCN key assignment scheme in a hierarchy
-
M. S. Hwang, "Cryptanalysis of YCN key assignment scheme in a hierarchy," Information Processing Letters, vol. 73, no. 3, pp. 97-101, 2000.
-
(2000)
Information Processing Letters
, vol.73
, Issue.3
, pp. 97-101
-
-
Hwang, M.S.1
-
10
-
-
0027699915
-
Modified Chang-Hwang-Wu access control scheme
-
M. S. Hwang, C. C. Chang and W.-P. Yang, "Modified Chang-Hwang-Wu access control scheme," IEE Electronics Letters, vol. 29, pp. 2095-2096, 1993.
-
(1993)
IEE Electronics Letters
, vol.29
, pp. 2095-2096
-
-
Hwang, M.S.1
Chang, C.C.2
Yang, W.-P.3
-
11
-
-
80054063079
-
A survey on distributed access control systems for web business processes
-
Hristo Koshutanski, "A survey on distributed access control systems for web business processes," International Journal of Network Security, vol. 9, no. 1, pp. 61-69, 2009.
-
(2009)
International Journal of Network Security
, vol.9
, Issue.1
, pp. 61-69
-
-
Hristo Koshutanski1
-
12
-
-
34547269639
-
Carlisle Adams, and Ali Miri, Us-ing threshold attribute-based encryption for practical biometric-based access control
-
Deholo Nali, Carlisle Adams, and Ali Miri, "Us-ing threshold attribute-based encryption for practical biometric-based access control," International Journal of Network Security, vol. 1, no. 3, pp. 173-182, 2005.
-
(2005)
International Journal of Network Security
, vol.1
, Issue.3
, pp. 173-182
-
-
Deholo Nali1
-
13
-
-
54049154521
-
A web-based multilayer access control model for multimedia applications in MPEG-7
-
Leon Pan, "A web-based multilayer access control model for multimedia applications in MPEG-7," International Journal of Network Security, vol. 4, no. 2, pp. 155-165, 2007.
-
(2007)
International Journal of Network Security
, vol.4
, Issue.2
, pp. 155-165
-
-
Leon Pan1
-
14
-
-
0036222059
-
A novel key manage-ment scheme based on discrete logarithms and polynomial interpolations
-
V. R. L. Shen and T. S. Chen, "A novel key manage-ment scheme based on discrete logarithms and poly-nomial interpolations," Computers & Security, vol. 21, no. 2, pp. 164-171, 2002.
-
(2002)
Computers & Security
, vol.21
, Issue.2
, pp. 164-171
-
-
Shen, V.R.L.1
Chen, T.S.2
-
15
-
-
0031248513
-
Novel cryptographic key assignment scheme for dynamic access control in a hierarchy
-
V. R. L. Shen, T. S. Chen and F. Lai, "Novel cryptographic key assignment scheme for dynamic access control in a hierarchy," Transactions on Fundamentals, vol. E80-A, no. 10, pp. 2035-2037, 1997.
-
(1997)
Transactions on Fundamentals
, vol.E80-A
, Issue.10
, pp. 2035-2037
-
-
Shen, V.R.L.1
Chen, T.S.2
Lai, F.3
-
16
-
-
80054057560
-
Formal specification of common criteria based access control policy model
-
Manpreet Singh and Manjeet S. Patterh, "Formal specification of common criteria based access control policy model," International Journal of Network Security, vol. 11, no. 3, pp. 112-121, 2010.
-
(2010)
International Journal of Network Security
, vol.11
, Issue.3
, pp. 112-121
-
-
Singh, M.1
Patterh, M.S.2
-
17
-
-
33847696259
-
Access Control in Networks Hierarchy: Implementation of Key Management Protocol
-
Nicolas Sklavos and Odysseas Koufopavlou, "Access Control in Networks Hierarchy: Implementation of Key Management Protocol," International Journal of Network Security, vol. 1, no. 2, pp. 103-109, 2005.
-
(2005)
International Journal of Network Security
, vol.1
, Issue.2
, pp. 103-109
-
-
Nicolas, S.1
Odysseas, K.2
-
18
-
-
78649878982
-
A Key Management Scheme for Hierarchical Access Control in Group Communication
-
Qiong Zhang, Yuke Wang, and Jason P. Jue, "A Key Management Scheme for Hierarchical Access Control in Group Communication," International Journal of Network Security, vol. 7, no. 3, pp. 323-334, 2008.
-
(2008)
International Journal of Network Security
, vol.7
, Issue.3
, pp. 323-334
-
-
Zhang, Q.1
Wang, Y.2
Jue, J.P.3
|