메뉴 건너뛰기




Volumn 26, Issue 4, 2011, Pages 697-710

Provably secure role-based encryption with revocation mechanism

Author keywords

Collusion Security; Cryptography; Revocation; Role HierarchyKey Hierarchy; Role Based Encryption

Indexed keywords

ACCESS CONTROL; CRYPTOGRAPHY; NETWORK SECURITY;

EID: 80054995027     PISSN: 10009000     EISSN: None     Source Type: Journal    
DOI: 10.1007/s11390-011-1169-9     Document Type: Conference Paper
Times cited : (21)

References (41)
  • 1
    • 0033652039 scopus 로고    scopus 로고
    • The nist model for role-based access control: Towards a unified standard
    • ACM Workshop on Role Based Access Control (RBAC), Berlin, Germany, Jul. 26-27
    • Sandhu R, Ferraiolo D F, Kuhn D R. The nist model for role-based access control: Towards a unified standard. In Proc. The 5th ACM Workshop on Role Based Access Control (RBAC), Berlin, Germany, Jul. 26-27, 2000, pp.47-63.
    • (2000) Proc. The 5th , pp. 47-63
    • Sandhu, R.1    Ferraiolo, D.F.2    Kuhn, D.R.3
  • 2
    • 67349151773 scopus 로고    scopus 로고
    • Towards secure dynamic collaborations with group-based RBAC model
    • Li Q, Zhang X W, Xu M W, Wu J P. Towards secure dynamic collaborations with group-based RBAC model. Computers &Security, 2009, 28(5): 260-275.
    • (2009) Computers &Security , vol.28 , Issue.5 , pp. 260-275
    • Li, Q.1    Zhang, X.W.2    Xu, M.W.3    Wu, J.P.4
  • 5
    • 84976752387 scopus 로고
    • Cryptographic solution to a prob-lem of access control in a hierarchy
    • Akl S G, Taylor P D. Cryptographic solution to a prob-lem of access control in a hierarchy. ACM Transactions on Computer System, 1983, 1(3): 239-248.
    • (1983) ACM Transactions on Computer System , vol.1 , Issue.3 , pp. 239-248
    • Akl, S.G.1    Taylor, P.D.2
  • 6
    • 0020931264 scopus 로고
    • Cryptographic solution to a multi-level security problem
    • Santa Barbara, USA
    • Akl S G, Taylor P D. Cryptographic solution to a multi-level security problem. In Proc. Advances in Cryptology: CRYPTO, Santa Barbara, USA, 1982, pp.237-249.
    • (1982) Proc. Advances in Cryptology: CRYPTO , pp. 237-249
    • Akl, S.G.1    Taylor, P.D.2
  • 7
    • 0003657439 scopus 로고    scopus 로고
    • Key management for multicast: Issues and architecture
    • draft-waller-key-arch-01.txt
    • Wallner D M, Harder E G, Agee R C. Key management for multicast: Issues and architecture. Internet Draft, draft-waller-key-arch-01.txt, 1998.
    • (1998) Internet Draft
    • Wallner, D.M.1    Harder, E.G.2    Agee, R.C.3
  • 13
    • 77955090387 scopus 로고    scopus 로고
    • How to construct identity-based signatures without the key escrow problem
    • Yuen T H, Susilo W, Mu Y. How to construct identity-based signatures without the key escrow problem. International Journal of Information Security, 2010, 9(4): 297-311.
    • (2010) International Journal of Information Security , vol.9 , Issue.4 , pp. 297-311
    • Yuen, T.H.1    Susilo, W.2    Mu, Y.3
  • 15
    • 0036187601 scopus 로고    scopus 로고
    • A time-bound cryptographic key assignment scheme for access control in a hierarchy
    • Tzeng W G. A time-bound cryptographic key assignment scheme for access control in a hierarchy. IEEE Transactions on Knowledge and Data Engineering, 2002, 14(1): 182-188.
    • (2002) IEEE Transactions on Knowledge and Data Engineering , vol.14 , Issue.1 , pp. 182-188
    • Tzeng, W.G.1
  • 19
    • 38049078557 scopus 로고    scopus 로고
    • Multi-authority attribute based encryption
    • Amsterdam, The Netherlands Feb. 21-24
    • Chase M. Multi-authority attribute based encryption. In Proc. The 4th Theory of Cryptography Conference (TCC), Amsterdam, The Netherlands, Feb. 21-24, 2007, pp.515-534.
    • (2007) Proc. The 4th Theory of Cryptography Conference (TCC) , pp. 515-534
    • Chase, M.1
  • 21
    • 69649091318 scopus 로고    scopus 로고
    • Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realiza-tion
    • Waters B. Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realiza-tion. Cryptology ePrint Archive, Report 2008/290, 2008, http://eprint.iacr.org/.
    • (2008) Cryptology EPrint Archive, Report 2008 , vol.290
    • Waters, B.1
  • 27
    • 33748485156 scopus 로고    scopus 로고
    • Attribute-based access control with hidden policies and hidden credentials
    • Frikken K B, Atallah M J, Li J T. Attribute-based access control with hidden policies and hidden credentials. IEEE Transaction on Computers, 2006, 55(10): 1259-1270.
    • (2006) IEEE Transaction on Computers , vol.55 , Issue.10 , pp. 1259-1270
    • Frikken, K.B.1    Atallah, M.J.2    Li, J.T.3
  • 31
    • 76549132529 scopus 로고    scopus 로고
    • Attribute-based signatures: Achieving attribute-privacy and collusion-resistance
    • Maji H, Prabhakaran M, Rosulek M. Attribute-based signatures: Achieving attribute-privacy and collusion-resistance. Cryptology ePrint Archive, Report 2008/328, 2008, http://eprint.iacr.org/.
    • (2008) Cryptology EPrint Archive, Report 2008 , vol.328
    • Maji, H.1    Prabhakaran, M.2    Rosulek, M.3
  • 32
    • 78650302516 scopus 로고    scopus 로고
    • Attribute-based signature with policy-and-endorsement mechanism
    • Wang H X, Zhu Y, Feng R Q. Attribute-based signature with policy-and-endorsement mechanism. Journal of Computer Science and Technology, 2010, 25(6): 1293-1304.
    • (2010) Journal of Computer Science and Technology , vol.25 , Issue.6 , pp. 1293-1304
    • Wang, H.X.1    Zhu, Y.2    Feng, R.Q.3
  • 35
  • 37
    • 84864163960 scopus 로고    scopus 로고
    • Microsoft Corporation. How encrypting file system works
    • Microsoft Corporation. How encrypting file system works. Microsoft TechNet Report, 2009, http://technet.mi-crosoft.com/en-us/library/cc781588(WS. 10).aspx.
    • (2009) Microsoft TechNet Report
  • 41
    • 0742303115 scopus 로고    scopus 로고
    • Windows 2000 security: A postmortem analysis
    • Schultz E E. Windows 2000 security: A postmortem analysis. Network Security, 2004, 2004(1): 6-9.
    • Network Security , vol.2004 , Issue.1 , pp. 6-9
    • Schultz, E.E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.