메뉴 건너뛰기




Volumn 12, Issue 3, 2011, Pages 178-180

A novel key management scheme for dynamic access control in a hierarchy

Author keywords

Access control; Cryptography; Data security; Key management.

Indexed keywords

COMPUTATIONAL TIME; DYNAMIC ACCESS CONTROL; KEY GENERATION; KEY MANAGEMENT.;

EID: 78649850078     PISSN: 1816353X     EISSN: 18163548     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (18)

References (18)
  • 1
    • 84976752387 scopus 로고
    • Cryptographic solution to a problem of access control in a hierarchy
    • S. G. Akl and P. D. Taylor, "Cryptographic solution to a problem of access control in a hierarchy," ACM Transactions on Computer Systems, vol. 1, pp. 239-248, 1983.
    • (1983) ACM Transactions on Computer Systems , vol.1 , pp. 239-248
    • Akl, S.G.1    Taylor, P.D.2
  • 2
    • 80054061336 scopus 로고    scopus 로고
    • An access control system with time-constraintusing support vector machines
    • Chin-Chen Chang, Iuon-Chang Lin, and Chia-Te Liao, "An access control system with time-constraintusing support vector machines," International Journal of Network Security, vol. 2, no. 2, pp. 150-159, 2006.
    • (2006) International Journal of Network Security , vol.2 , Issue.2 , pp. 150-159
    • Chin-Chen, C.1    Iuon-Chang, L.2    Chia-Te, L.3
  • 3
    • 0036396975 scopus 로고    scopus 로고
    • Hierarchical access control based on chinese remainder theorem and symmetric algorithm
    • T. S. Chen and Y. F. Chung, "Hierarchical access control based on chinese remainder theorem and symmetric algorithm," Computers & Security, vol. 21, no. 6, pp. 565-570, 2002.
    • (2002) Computers & Security , vol.21 , Issue.6 , pp. 565-570
    • Chen, T.S.1    Chung, Y.F.2
  • 5
    • 44549087923 scopus 로고    scopus 로고
    • An asymmetric cryptographic key assignment scheme for access control in tree structural hierarchies
    • Debasis Giri and P. D. Srivastava, "An asymmetric cryptographic key assignment scheme for access control in tree structural hierarchies," International Journal of Network Security, vol. 4, no. 3, pp. 348-354, 2007.
    • (2007) International Journal of Network Security , vol.4 , Issue.3 , pp. 348-354
    • Giri, D.1    Srivastava, P.D.2
  • 6
    • 80054086407 scopus 로고    scopus 로고
    • A cryptographic key assignment scheme for access control in poset ordered hierarchies with enhanced security
    • Debasis Giri and P. D. Srivastava, "A cryptographic key assignment scheme for access control in poset ordered hierarchies with enhanced security," International Journal of Network Security, vol. 7, no. 2, pp. 223-234, 2008.
    • (2008) International Journal of Network Security , vol.7 , Issue.2 , pp. 223-234
    • Debasis Giri, P.D.1    Srivastava, K.I.2
  • 7
    • 0032663530 scopus 로고    scopus 로고
    • Extension of CHW cryptographic key assignment scheme in a hierarchy
    • M. S. Hwang, "Extension of CHW cryptographic key assignment scheme in a hierarchy," IEE Proceedings Computers and Digital Techniques, vol. 146, no. 4, pp. 219, 1999.
    • (1999) IEE Proceedings Computers and Digital Techniques , vol.146 , Issue.4 , pp. 219
    • Hwang, M.S.1
  • 8
    • 0033751899 scopus 로고    scopus 로고
    • An asymmetric cryptographic scheme for a totally-ordered hierarchy
    • M. S. Hwang, "An asymmetric cryptographic scheme for a totally-ordered hierarchy," International Journal of Computer Mathematics, vol. 73, pp. 463-468, 2000.
    • (2000) International Journal of Computer Mathematics , vol.73 , pp. 463-468
    • Hwang, M.S.1
  • 9
    • 0033908596 scopus 로고    scopus 로고
    • Cryptanalysis of YCN key assignment scheme in a hierarchy
    • M. S. Hwang, "Cryptanalysis of YCN key assignment scheme in a hierarchy," Information Processing Letters, vol. 73, no. 3, pp. 97-101, 2000.
    • (2000) Information Processing Letters , vol.73 , Issue.3 , pp. 97-101
    • Hwang, M.S.1
  • 10
    • 0027699915 scopus 로고
    • Modified Chang-Hwang-Wu access control scheme
    • M. S. Hwang, C. C. Chang and W.-P. Yang, "Modified Chang-Hwang-Wu access control scheme," IEE Electronics Letters, vol. 29, pp. 2095-2096, 1993.
    • (1993) IEE Electronics Letters , vol.29 , pp. 2095-2096
    • Hwang, M.S.1    Chang, C.C.2    Yang, W.-P.3
  • 11
    • 80054063079 scopus 로고    scopus 로고
    • A survey on distributed access control systems for web business processes
    • Hristo Koshutanski, "A survey on distributed access control systems for web business processes," International Journal of Network Security, vol. 9, no. 1, pp. 61-69, 2009.
    • (2009) International Journal of Network Security , vol.9 , Issue.1 , pp. 61-69
    • Hristo Koshutanski1
  • 12
    • 34547269639 scopus 로고    scopus 로고
    • Carlisle Adams, and Ali Miri, Us-ing threshold attribute-based encryption for practical biometric-based access control
    • Deholo Nali, Carlisle Adams, and Ali Miri, "Us-ing threshold attribute-based encryption for practical biometric-based access control," International Journal of Network Security, vol. 1, no. 3, pp. 173-182, 2005.
    • (2005) International Journal of Network Security , vol.1 , Issue.3 , pp. 173-182
    • Deholo Nali1
  • 13
    • 54049154521 scopus 로고    scopus 로고
    • A web-based multilayer access control model for multimedia applications in MPEG-7
    • Leon Pan, "A web-based multilayer access control model for multimedia applications in MPEG-7," International Journal of Network Security, vol. 4, no. 2, pp. 155-165, 2007.
    • (2007) International Journal of Network Security , vol.4 , Issue.2 , pp. 155-165
    • Leon Pan1
  • 14
    • 0036222059 scopus 로고    scopus 로고
    • A novel key manage-ment scheme based on discrete logarithms and polynomial interpolations
    • V. R. L. Shen and T. S. Chen, "A novel key manage-ment scheme based on discrete logarithms and poly-nomial interpolations," Computers & Security, vol. 21, no. 2, pp. 164-171, 2002.
    • (2002) Computers & Security , vol.21 , Issue.2 , pp. 164-171
    • Shen, V.R.L.1    Chen, T.S.2
  • 15
    • 0031248513 scopus 로고    scopus 로고
    • Novel cryptographic key assignment scheme for dynamic access control in a hierarchy
    • V. R. L. Shen, T. S. Chen and F. Lai, "Novel cryptographic key assignment scheme for dynamic access control in a hierarchy," Transactions on Fundamentals, vol. E80-A, no. 10, pp. 2035-2037, 1997.
    • (1997) Transactions on Fundamentals , vol.E80-A , Issue.10 , pp. 2035-2037
    • Shen, V.R.L.1    Chen, T.S.2    Lai, F.3
  • 16
    • 80054057560 scopus 로고    scopus 로고
    • Formal specification of common criteria based access control policy model
    • Manpreet Singh and Manjeet S. Patterh, "Formal specification of common criteria based access control policy model," International Journal of Network Security, vol. 11, no. 3, pp. 112-121, 2010.
    • (2010) International Journal of Network Security , vol.11 , Issue.3 , pp. 112-121
    • Singh, M.1    Patterh, M.S.2
  • 17
    • 33847696259 scopus 로고    scopus 로고
    • Access Control in Networks Hierarchy: Implementation of Key Management Protocol
    • Nicolas Sklavos and Odysseas Koufopavlou, "Access Control in Networks Hierarchy: Implementation of Key Management Protocol," International Journal of Network Security, vol. 1, no. 2, pp. 103-109, 2005.
    • (2005) International Journal of Network Security , vol.1 , Issue.2 , pp. 103-109
    • Nicolas, S.1    Odysseas, K.2
  • 18
    • 78649878982 scopus 로고    scopus 로고
    • A Key Management Scheme for Hierarchical Access Control in Group Communication
    • Qiong Zhang, Yuke Wang, and Jason P. Jue, "A Key Management Scheme for Hierarchical Access Control in Group Communication," International Journal of Network Security, vol. 7, no. 3, pp. 323-334, 2008.
    • (2008) International Journal of Network Security , vol.7 , Issue.3 , pp. 323-334
    • Zhang, Q.1    Wang, Y.2    Jue, J.P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.