메뉴 건너뛰기




Volumn 36, Issue 4, 2012, Pages 2325-2337

An efficient key-management scheme for hierarchical access control in E-medicine system

Author keywords

Access control; E medicine; Hybrid cryptosystems; Key management; User hierarchy

Indexed keywords

ARTICLE; COMPUTER NETWORK; ELECTRONIC MEDICAL RECORD; HOSPITAL INFORMATION SYSTEM; INFORMATION STORAGE; INTERNET; MEDICAL HISTORY; MEDICAL INFORMATION; MEDICAL INFORMATION SYSTEM; ACCESS TO INFORMATION; COMPUTER PROGRAM; COMPUTER SECURITY; HUMAN; ORGANIZATION AND MANAGEMENT;

EID: 84873031582     PISSN: 01485598     EISSN: 1573689X     Source Type: Journal    
DOI: 10.1007/s10916-011-9700-7     Document Type: Article
Times cited : (57)

References (36)
  • 1
    • 84863200393 scopus 로고    scopus 로고
    • A Password-Based User Authentication Scheme for the Integrated EPR Information System
    • 10.1007/s10916-010-9527-7
    • Wu, Z., Chung, Y., Lai, F., Chen, T., A Password-Based User Authentication Scheme for the Integrated EPR Information System. J Med Syst, 2010. doi: 10.1007/s10916-010-9527-7.
    • (2010) J Med Syst
    • Wu, Z.1    Chung, Y.2    Lai, F.3    Chen, T.4
  • 2
    • 77956061440 scopus 로고    scopus 로고
    • Efficient Utilization of Elliptic Curve Cryptosystem for Hierarchical Access Control
    • 10.1016/j.jss.2010.05.072
    • Nikooghadam, M., Zakerolhosseini, A., Moghaddam, M.E., Efficient Utilization of Elliptic Curve Cryptosystem for Hierarchical Access Control. The Journal of Systems and Software, 2010. doi: 10.1016/j.jss.2010.05.072.
    • (2010) The Journal of Systems and Software
    • Nikooghadam, M.1    Zakerolhosseini, A.2    Moghaddam, M.E.3
  • 3
    • 84976752387 scopus 로고
    • Cryptographic solution to a problem of access control in a hierarchy
    • 10.1145/357369.357372
    • Akl, S.G., Taylor, P.D., Cryptographic solution to a problem of access control in a hierarchy. ACM Transaction on Computer Systems 1(3):239-248, 1983.
    • (1983) ACM Transaction on Computer Systems , vol.1 , Issue.3 , pp. 239-248
    • Akl, S.G.1    Taylor, P.D.2
  • 4
    • 0022115074 scopus 로고
    • An optimal algorithm for assigning cryptographic keys to control access in a hierarchy
    • 10.1109/TC.1985.1676635
    • Mackinnon, S.T.,Taylor, P.D., An optimal algorithm for assigning cryptographic keys to control access in a hierarchy. IEEE Transaction on Computer systems 34 (9):797-802, 1985.
    • (1985) IEEE Transaction on Computer Systems , vol.34 , Issue.9 , pp. 797-802
    • MacKinnon, S.T.1    Taylor, P.D.2
  • 5
    • 0000954459 scopus 로고
    • A cryptographic key generation scheme for multilevel data security
    • 10.1016/0167-4048(90)90132-D
    • Harn, L., Lin, H.Y., A cryptographic key generation scheme for multilevel data security. Computer Security 9:539-546, 1990.
    • (1990) Computer Security , vol.9 , pp. 539-546
    • Harn, L.1    Lin, H.Y.2
  • 6
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • 700103 0368.94005 10.1145/359340.359342
    • Rivest, R.L.,Shamir, A., Adleman, L., A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21 (2):120-126, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 7
    • 0001692137 scopus 로고
    • Cryptographic key assignment scheme for access control in a hierarchy
    • 10.1016/0306-4379(92)90015-F
    • Chang, C.C., Hwang, R.J., Wu, T.C., Cryptographic key assignment scheme for access control in a hierarchy. Information Systems 17 (3):243-247, 1992.
    • (1992) Information Systems , vol.17 , Issue.3 , pp. 243-247
    • Chang, C.C.1    Hwang, R.J.2    Wu, T.C.3
  • 8
    • 38249003211 scopus 로고
    • Access control in a hierarchy using a one-way trapdoor function
    • 0784.93008 10.1016/0898-1221(93)90075-7
    • Chang, C.C., Buehrer, D.J., Access control in a hierarchy using a one-way trapdoor function. Computers and Mathematics with Applications 26 (5):71-76, 1993.
    • (1993) Computers and Mathematics with Applications , vol.26 , Issue.5 , pp. 71-76
    • Chang, C.C.1    Buehrer, D.J.2
  • 9
    • 0036920852 scopus 로고    scopus 로고
    • A practical key management scheme for access control in a user hierarchy
    • 10.1016/S0167-4048(02)00815-5
    • Zhong, S., A practical key management scheme for access control in a user hierarchy. Computers & Security 21(8):750-759, 2002.
    • (2002) Computers & Security , vol.21 , Issue.8 , pp. 750-759
    • Zhong, S.1
  • 11
    • 33745584616 scopus 로고    scopus 로고
    • An access control scheme for partially ordered set hierarchy with provable security
    • Wu, J., Wei, R., An access control scheme for partially ordered set hierarchy with provable security. In of SAC 2005, LNCS 3897, pp. 221-232, 2006.
    • (2006) SAC 2005, LNCS , vol.3897 , pp. 221-232
    • Wu, J.1    Wei, R.2
  • 13
    • 0036222059 scopus 로고    scopus 로고
    • A novel key management scheme based on discrete logarithms and polynomial interpolations
    • 10.1016/S0167-4048(02)00211-0
    • Shen, V.R.L., Chen, T.S., A novel key management scheme based on discrete logarithms and polynomial interpolations. Computers and Security 21(2):164-171, 2002.
    • (2002) Computers and Security , vol.21 , Issue.2 , pp. 164-171
    • Shen, V.R.L.1    Chen, T.S.2
  • 14
    • 32644451622 scopus 로고    scopus 로고
    • A new solution for assigning cryptographic keys to control access in mobile agent environments
    • 501605 10.1002/wcm.276
    • Chang, C.C., Lin, I.C., A new solution for assigning cryptographic keys to control access in mobile agent environments. Wireless Communications and Mobile Computing 6(1):137-146, 2006.
    • (2006) Wireless Communications and Mobile Computing , vol.6 , Issue.1 , pp. 137-146
    • Chang, C.C.1    Lin, I.C.2
  • 15
    • 38049032950 scopus 로고    scopus 로고
    • A secure time-bound hierarchical key assignment scheme based on RSA public key cryptosystem
    • 2381400 05686484 10.1016/j.ipl.2007.08.017
    • Yeh, J.H., A secure time-bound hierarchical key assignment scheme based on RSA public key cryptosystem. Information Processing Letters 105:117-120, 2008.
    • (2008) Information Processing Letters , vol.105 , pp. 117-120
    • Yeh, J.H.1
  • 16
    • 0038053203 scopus 로고    scopus 로고
    • Controlling access in large partially-ordered hierarchies using cryptographic keys
    • 10.1016/S0164-1212(02)00091-2
    • Hwang, M.S., Yang, W.P., Controlling access in large partially-ordered hierarchies using cryptographic keys. Journal of Systems and Software 67(2):99-107, 2003.
    • (2003) Journal of Systems and Software , vol.67 , Issue.2 , pp. 99-107
    • Hwang, M.S.1    Yang, W.P.2
  • 17
    • 78649817331 scopus 로고    scopus 로고
    • An efficient key assignment scheme for access control in a large leaf class hierarchy
    • 10.1016/j.ins.2010.09.033
    • Lo, J.-W., Hwang, M.-S., Liu, C.-H., An efficient key assignment scheme for access control in a large leaf class hierarchy. Inform. Sci., 2010. doi: 10.1016/j.ins.2010.09.033.
    • (2010) Inform. Sci.
    • Lo, J.-W.1    Hwang, M.-S.2    Liu, C.-H.3
  • 19
    • 84968503742 scopus 로고
    • Elliptic curve cryptosystem
    • 866109 0622.94015 10.1090/S0025-5718-1987-0866109-5
    • Koblitz, N., Elliptic curve cryptosystem. Mathematics of Computation 48:203-209, 1987.
    • (1987) Mathematics of Computation , vol.48 , pp. 203-209
    • Koblitz, N.1
  • 20
    • 84877582056 scopus 로고    scopus 로고
    • NIST, Recommendation on Key management. DRAFT Special Publication
    • NIST, Recommendation on Key management. DRAFT Special Publication, pp. 800-857, 2003, http://csrc.nist.gov/CryptoToolkit/kms/guideline-1-jan03.pdf.
    • (2003) , pp. 800-857
  • 22
    • 34948898634 scopus 로고    scopus 로고
    • Access control in user hierarchy based on elliptic curve Cryptosystem
    • 2375876 1134.94358 10.1016/j.ins.2007.08.001
    • Chung, Y.F., Lee, H.H., Lai, F., Chen, T.S., Access control in user hierarchy based on elliptic curve Cryptosystem. Information Sciences 178: 230-243, 2008.
    • (2008) Information Sciences , vol.178 , pp. 230-243
    • Chung, Y.F.1    Lee, H.H.2    Lai, F.3    Chen, T.S.4
  • 23
    • 33745856988 scopus 로고    scopus 로고
    • An efficient key-management scheme for hierarchical access control based on elliptic curve cryptosystem
    • 10.1016/j.jss.2006.01.018
    • Jeng, F.G., Wang, C.M., An efficient key-management scheme for hierarchical access control based on elliptic curve cryptosystem. The Journal of Systems and Software 79:1161-1167, 2006.
    • (2006) The Journal of Systems and Software , vol.79 , pp. 1161-1167
    • Jeng, F.G.1    Wang, C.M.2
  • 26
    • 84877575899 scopus 로고    scopus 로고
    • Advanced Encryption Standard
    • Advanced Encryption Standard, http://www.csrc.nist.gov/archieve/aes/.
  • 28
    • 33845645839 scopus 로고    scopus 로고
    • Doctoral Thesis of Brisbane Australia: Queensland University of Technology
    • Choo K.-K. R., Key Establishment: Proofs and Refutations. Doctoral Thesis of Brisbane Australia: Queensland University of Technology, 2006.
    • (2006) Key Establishment: Proofs and Refutations
    • Choo, K.-K.R.1
  • 30
    • 84948957152 scopus 로고    scopus 로고
    • Public-key Encryption in a Multi-User Setting: Security Proofs and Improvements
    • Springer-Verlag
    • Bellare, M., Boldyreva, A., Micali, S., Public-key Encryption in a Multi-User Setting: Security Proofs and Improvements. In Proc. of Eurocrypt 2000, LNCS 1807, Springer-Verlag, pp. 259-274, 2000.
    • (2000) Proc. of Eurocrypt 2000, LNCS 1807 , pp. 259-274
    • Bellare, M.1    Boldyreva, A.2    Micali, S.3
  • 32
    • 0348003132 scopus 로고    scopus 로고
    • The state of elliptic curve cryptography
    • 1759616 0996.94032 10.1023/A:1008354106356
    • Koblitz, N., Menezes, A., Vanstone, S.A., The state of elliptic curve cryptography. Designs, Codes and Cryptography 19(2-3):173-193, 2000.
    • (2000) Designs, Codes and Cryptography , vol.19 , Issue.2-3 , pp. 173-193
    • Koblitz, N.1    Menezes, A.2    Vanstone, S.A.3
  • 33
    • 84877580061 scopus 로고    scopus 로고
    • National Institute of Standards and Technology, US Department of Commerce, Secure Hash Standard
    • National Institute of Standards and Technology, US Department of Commerce, Secure Hash Standard. US Federal Information Processing Standard Publication 180-2, 2002.
    • (2002) US Federal Information Processing Standard Publication , vol.180 , Issue.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.