메뉴 건너뛰기




Volumn 56, Issue 8, 2012, Pages 2107-2118

An efficient key management scheme for content access control for linear hierarchies

Author keywords

Content access control; Group communication; Key management; Linear hierarchies; Network security

Indexed keywords

ACCESS RIGHTS; CONTROL PROBLEMS; DATA STREAMING; GROUP COMMUNICATIONS; KEY MANAGEMENT; LINEAR HIERARCHIES; MULTI-LAYERED; SHAPE CHANGE;

EID: 84859873785     PISSN: 13891286     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comnet.2012.02.006     Document Type: Article
Times cited : (22)

References (43)
  • 1
    • 34248671101 scopus 로고    scopus 로고
    • Key management for content access control in a hierarchy
    • DOI 10.1016/j.comnet.2006.12.011, PII S1389128607000333
    • H.R. Hassen, A. Bouabdallah, H. Bettahar, and Y. Challal Key management for content access control in a hierarchy Computer Network. 51 11 2007 3197 3219 < http://dx.doi.org/10.1016/j.comnet.2006.12.011 > (Pubitemid 46777449)
    • (2007) Computer Networks , vol.51 , Issue.11 , pp. 3197-3219
    • Hassen, H.R.1    Bouabdallah, A.2    Bettahar, H.3    Challal, Y.4
  • 2
    • 0033893174 scopus 로고    scopus 로고
    • Secure group communications using key graphs
    • DOI 10.1109/90.836475
    • C.K. Wong, M. Gouda, and S.S. Lam Secure group communications using key graphs IEEE/ACM Transactions on Networking 8 1 2000 16 30 (Pubitemid 30584705)
    • (2000) IEEE/ACM Transactions on Networking , vol.8 , Issue.1 , pp. 16-30
    • Wong, C.K.1    Gouda, M.2    Lam, S.S.3
  • 11
    • 0034318740 scopus 로고    scopus 로고
    • Scalable secure one-to-many group communication using dual encryption
    • DOI 10.1016/S0140-3664(00)00255-3
    • L.R. Dondeti, S. Mukherjee, and A. Samal Scalable secure one-to-many group communication using dual encryption Computer Communications 23 17 2000 1681 1701 (Pubitemid 32033569)
    • (2000) Computer Communications , vol.23 , Issue.17 , pp. 1681-1701
    • Dondeti, L.R.1    Mukherjee, S.2    Samal, A.3
  • 20
    • 0033893174 scopus 로고    scopus 로고
    • Secure group communications using key graphs
    • DOI 10.1109/90.836475
    • C.K. Wong, M. Gouda, and S. Lam Secure group communications using key graphs Networking, IEEE/ACM Transactions on 8 1 2000 16 30 10.1109/90.836475 (Pubitemid 30584705)
    • (2000) IEEE/ACM Transactions on Networking , vol.8 , Issue.1 , pp. 16-30
    • Wong, C.K.1    Gouda, M.2    Lam, S.S.3
  • 21
    • 0019057051 scopus 로고
    • Design of a cryptography based secure file system
    • E. Gudes The design of a cryptography based secure file system IEEE Transactions on Software Engineering SE-6 5 1980 411 420 (Pubitemid 11453637)
    • (1980) IEEE Transactions on Software Engineering , vol.SE-6 , Issue.5 , pp. 411-420
    • Gudes Ehud1
  • 22
    • 84976752387 scopus 로고
    • Cryptographic solution to a problem of access control in a hierarchy
    • S. Akl, and P. Taylor Cryptographic solution to a problem of access control in a hierarchy ACM Transactions on Computer Systems 1983 239 248
    • (1983) ACM Transactions on Computer Systems , pp. 239-248
    • Akl, S.1    Taylor, P.2
  • 23
    • 0023962708 scopus 로고
    • Cryptographic implementation of a tree hierarchy for access control
    • DOI 10.1016/0020-0190(88)90099-3
    • R. Sandhu Cryptographic implementation of a tree hierarchy for access control Information Processing Letters 27 2 1988 95 98 (Pubitemid 18588349)
    • (1988) Information Processing Letters , vol.27 , Issue.2 , pp. 95-98
    • Sandhu Ravinderpal, S.1
  • 25
    • 10644259523 scopus 로고    scopus 로고
    • Access control in a hierarchy using one-way functions
    • C. Yang, and C. Li Access control in a hierarchy using one-way functions Elsevier Computers and Security 23 2004 659 664
    • (2004) Elsevier Computers and Security , vol.23 , pp. 659-664
    • Yang, C.1    Li, C.2
  • 29
    • 0242456749 scopus 로고    scopus 로고
    • A cryptographic solution to implement access control in a hierarchy and more
    • I. Ray, I. Ray, and N. Narasimhamurthi A cryptographic solution to implement access control in a hierarchy and more SACMAT'02 2002 65 73
    • (2002) SACMAT'02 , pp. 65-73
    • Ray, I.1    Ray, I.2    Narasimhamurthi, N.3
  • 30
    • 84956999112 scopus 로고    scopus 로고
    • Chinese Remainder Theorem Based Hierarchical Access Control for Secure Group Communication
    • Information and Communications Security
    • X. Zou, B. Ramamurthy, S.S. Magliveras, Chinese remainder theorem based hierarchical access control for secure group communication, in: ICICS '01: Proceedings of the Third International Conference on Information and Communications Security, 2001, pp. 381-385. (Pubitemid 33361988)
    • (2001) Lecture Notes in Computer Science , Issue.2229 , pp. 381-385
    • Zou, X.1    Ramamurthy, B.2    Magliveras, S.S.3
  • 33
    • 0036222059 scopus 로고    scopus 로고
    • A novel key management scheme based on discrete logarithms and polynomial interpolations
    • DOI 10.1016/S0167-4048(02)00211-0
    • V. Shen, and T. Chen A novel key management scheme based on discrete logarithms and polynomial interpolations Computers and Security 21 2 2002 164 171 (Pubitemid 34288358)
    • (2002) Computers and Security , vol.21 , Issue.2 , pp. 164-171
    • Shen, V.R.L.1    Chen, T.-S.2
  • 36
    • 33745792230 scopus 로고    scopus 로고
    • Hierarchical key management scheme using polynomial interpolation
    • DOI 10.1145/1044552.1044556
    • M.L. Das, A. Saxena, V.P. Gulati, and D.B. Phatak Hierarchical key management scheme using polynomial interpolation SIGOPS Operating Systems Review 39 1 2005 40 47 < http://doi.acm.org/10.1145/1044552.1044556 > (Pubitemid 44849609)
    • (2005) Operating Systems Review (ACM) , vol.39 , Issue.1 , pp. 40-47
    • Das, M.L.1    Saxena, A.2    Gulati, V.P.3    Phatak, D.B.4
  • 41
    • 23944524527 scopus 로고    scopus 로고
    • Secure group communication based scheme for differential access control in dynamic environments
    • Proceedings - 11th International Conference on Parallel and Distributed Systems Workshops, ICPADS 2005
    • Y. Karandikar, X. Zou, Y. Dai, Secure group communication based scheme for differential access control in dynamic environments, in: Parallel and Distributed Systems, 2005. Proceedings. 11th International Conference on, vol. 2, 2005, pp. 448-452. doi:10.1109/ICPADS.2005.260. (Pubitemid 41190243)
    • (2005) Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS , vol.2 , pp. 448-452
    • Karandikar, Y.1    Zou, X.2    Dai, Y.3
  • 43
    • 0242341057 scopus 로고    scopus 로고
    • Multicast group behavior in the internet's multicast backbone (MBone)
    • K. Almeroth, and M. Ammar Multicast group behavior in the internet's multicast backbone (mbone) Communications Magazine, IEEE 35 6 1997 124 129 10.1109/35.587716 (Pubitemid 127648436)
    • (1997) IEEE Communications Magazine , vol.35 , Issue.6 , pp. 124-129
    • Almeroth, K.C.1    Ammar, M.H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.