-
1
-
-
84976752387
-
Cryptographic solution to a problem of access control in a hierarchy
-
Akl, S.G., Taylor, P.D.: Cryptographic solution to a problem of access control in a hierarchy. ACM Transactions on Computer Systems 1(3), 239-248 (1983)
-
(1983)
ACM Transactions on Computer Systems
, vol.1
, Issue.3
, pp. 239-248
-
-
Akl, S.G.1
Taylor, P.D.2
-
2
-
-
60349128962
-
Dynamic and efficient key management for access hierarchies
-
Atallah, M.J., Blanton, M., Fazio, N., Frikken, K.B.: Dynamic and efficient key management for access hierarchies. ACM Transactions on Information and System Security 12(3) (2009)
-
(2009)
ACM Transactions on Information and System Security
, vol.12
, Issue.3
-
-
Atallah, M.J.1
Blanton, M.2
Fazio, N.3
Frikken, K.B.4
-
3
-
-
33745793594
-
Dynamic and efficient key management for access hierarchies
-
Atallah, M.J., Frikken, K.B., Blanton, M.: Dynamic and efficient key management for access hierarchies. In: Proceedings of the ACM Conference on Computer and Communications Security (CCS), pp. 190-202 (2005)
-
(2005)
Proceedings of the ACM Conference on Computer and Communications Security (CCS)
, pp. 190-202
-
-
Atallah, M.J.1
Frikken, K.B.2
Blanton, M.3
-
4
-
-
33745218758
-
Improved proxy re-encryption schemes with applications to secure distributed storage
-
Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Transactions on Information and System Security 9(1), 1-30 (2006)
-
(2006)
ACM Transactions on Information and System Security
, vol.9
, Issue.1
, pp. 1-30
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
-
5
-
-
0003400251
-
-
Technical Report MTR-2997, Mitre Corporation, Bedford, Massachusetts
-
Bell, D.E., Lapadula, L.J.: Secure computer systems: Unified exposition and multics interpretation. Technical Report MTR-2997, Mitre Corporation, Bedford, Massachusetts (1976)
-
(1976)
Secure Computer Systems: Unified Exposition and Multics Interpretation
-
-
Bell, D.E.1
Lapadula, L.J.2
-
6
-
-
34548731375
-
Ciphertext-policy attribute-based encryption
-
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: Proceedings of the IEEE Symposium on Security and Privacy (S&P), pp. 321-334 (2007)
-
(2007)
Proceedings of the IEEE Symposium on Security and Privacy (S&P)
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
7
-
-
84957718934
-
Divertible protocols and atomic proxy cryptography
-
Advances in Cryptology - EUROCRYPT '98
-
Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127-144. Springer, Heidelberg (1998) (Pubitemid 128081481)
-
(1998)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.1403
, pp. 127-144
-
-
Blaze, M.1
Bleumer, G.2
Strauss, M.3
-
8
-
-
69949166012
-
Identity-based encryption with efficient revocation
-
Boldyreva, A., Goyal, V., Kumar, V.: Identity-based encryption with efficient revocation. In: ACM Conference on Computer and Communications Security (CCS), pp. 417-426 (2008)
-
(2008)
ACM Conference on Computer and Communications Security (CCS)
, pp. 417-426
-
-
Boldyreva, A.1
Goyal, V.2
Kumar, V.3
-
10
-
-
84922053594
-
Cloudhka: A cryptographic approach for hierarchical access control in cloud computing
-
Report 2013/208
-
Chen, Y.-R., Chu, C.-K., Tzeng, W.-G., Zhou, J.: Cloudhka: A cryptographic approach for hierarchical access control in cloud computing. Cryptology ePrint Archive, Report 2013/208 (2013), http://eprint.iacr.org/
-
(2013)
Cryptology ePrint Archive
-
-
Chen, Y.-R.1
Chu, C.-K.2
Tzeng, W.-G.3
Zhou, J.4
-
11
-
-
79960886232
-
Secure group key management using unidirectional proxy re-encryption schemes
-
Chen, Y.-R., Tygar, J.D., Tzeng, W.-G.: Secure group key management using unidirectional proxy re-encryption schemes. In: Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), pp. 1952-1960 (2011)
-
(2011)
Proceedings of the IEEE International Conference on Computer Communications (INFOCOM)
, pp. 1952-1960
-
-
Chen, Y.-R.1
Tygar, J.D.2
Tzeng, W.-G.3
-
12
-
-
83255176956
-
An efficient and secure group key management scheme supporting frequent key updates on pay-tv systems
-
Chou, K.-Y., Chen, Y.-R., Tzeng, W.-G.: An efficient and secure group key management scheme supporting frequent key updates on pay-tv systems. In: Proceedings of the IEEE Asia-Pacific Network Operations and Management Symposium (APNOMS), pp. 1-8 (2011)
-
(2011)
Proceedings of the IEEE Asia-Pacific Network Operations and Management Symposium (APNOMS)
, pp. 1-8
-
-
Chou, K.-Y.1
Chen, Y.-R.2
Tzeng, W.-G.3
-
13
-
-
33947630349
-
On key assignment for hierarchical access control
-
Crampton, J., Martin, K.M., Wild, P.R.: On key assignment for hierarchical access control. In: Proceedings of the IEEE Computer Security Foundations Workshop (CSFW), pp. 98-111 (2006)
-
(2006)
Proceedings of the IEEE Computer Security Foundations Workshop (CSFW)
, pp. 98-111
-
-
Crampton, J.1
Martin, K.M.2
Wild, P.R.3
-
14
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the ACM Conference on Computer and Communications Security (CCS), pp. 89-98 (2006)
-
(2006)
Proceedings of the ACM Conference on Computer and Communications Security (CCS)
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
15
-
-
38049061546
-
Identity-based proxy re-encryption
-
Katz, J., Yung, M. (eds.) ACNS 2007. Springer, Heidelberg
-
Green, M., Ateniese, G.: Identity-based proxy re-encryption. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 288-306. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4521
, pp. 288-306
-
-
Green, M.1
Ateniese, G.2
-
17
-
-
0000954459
-
A cryptographic key generation scheme for multilevel data security
-
Harn, L., Lin, H.-Y.: A cryptographic key generation scheme for multilevel data security. Computers & Security 9(6), 539-546 (1990)
-
(1990)
Computers & Security
, vol.9
, Issue.6
, pp. 539-546
-
-
Harn, L.1
Lin, H.-Y.2
-
18
-
-
79957585981
-
Attribute-based access control with efficient revocation in data outsourcing systems
-
Hur, J., Noh, D.K.: Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Transactions on Parallel and Distributed Systems 22(7), 1214-1221 (2011)
-
(2011)
IEEE Transactions on Parallel and Distributed Systems
, vol.22
, Issue.7
, pp. 1214-1221
-
-
Hur, J.1
Noh, D.K.2
-
19
-
-
84864644840
-
Fully secure unidirectional identity-based proxy reencryption
-
Kim, H. (ed.) ICISC 2011. Springer, Heidelberg
-
Luo, S., Shen, Q., Chen, Z.: Fully secure unidirectional identity-based proxy reencryption. In: Kim, H. (ed.) ICISC 2011. LNCS, vol. 7259, pp. 109-126. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7259
, pp. 109-126
-
-
Luo, S.1
Shen, Q.2
Chen, Z.3
-
20
-
-
0022115074
-
An optimal algorithm for assigning cryptographic keys to control access in a hierarchy
-
MacKinnon, S.J., Taylor, P.D., Meijer, H., Akl, S.G.: An optimal algorithm for assigning cryptographic keys to control access in a hierarchy. IEEE Transactions on Computers 34(9), 797-802 (1985)
-
(1985)
IEEE Transactions on Computers
, vol.34
, Issue.9
, pp. 797-802
-
-
MacKinnon, S.J.1
Taylor, P.D.2
Meijer, H.3
Akl, S.G.4
-
21
-
-
0242456749
-
A cryptographic solution to implement access control in a hierarchy and more
-
Ray, I., Ray, I., Narasimhamurthi, N.: A cryptographic solution to implement access control in a hierarchy and more. In: ACM Symposium on Access Control Models and Technologies (SACMAT), pp. 65-73 (2002)
-
(2002)
ACM Symposium on Access Control Models and Technologies (SACMAT)
, pp. 65-73
-
-
Ray, I.1
Ray, I.2
Narasimhamurthi, N.3
-
22
-
-
84947912552
-
All-or-nothing encryption and the package transform
-
Biham, E. (ed.) FSE 1997. Springer, Heidelberg
-
Rivest, R.L.: All-or-nothing encryption and the package transform. In: Biham, E. (ed.) FSE 1997. LNCS, vol. 1267, pp. 210-218. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1267
, pp. 210-218
-
-
Rivest, R.L.1
-
23
-
-
84865465739
-
Dynamic credentials and ciphertext delegation for attribute-based encryption
-
Safavi-Naini, R. (ed.) CRYPTO 2012. Springer, Heidelberg
-
Sahai, A., Seyalioglu, H., Waters, B.: Dynamic credentials and ciphertext delegation for attribute-based encryption. In: Safavi-Naini, R. (ed.) CRYPTO 2012. LNCS, vol. 7417, pp. 199-217. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7417
, pp. 199-217
-
-
Sahai, A.1
Seyalioglu, H.2
Waters, B.3
-
24
-
-
24944554962
-
Fuzzy identity-based encryption
-
Cramer, R. (ed.) EUROCRYPT 2005. Springer, Heidelberg
-
Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457-473. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
25
-
-
80052271043
-
Efficient provably-secure hierarchical key assignment schemes
-
De Santis, A., Ferrara, A.L., Masucci, B.: Efficient provably-secure hierarchical key assignment schemes. Theoretical Computer Science 412(41), 5684-5699 (2011)
-
(2011)
Theoretical Computer Science
, vol.412
, Issue.41
, pp. 5684-5699
-
-
De Santis, A.1
Ferrara, A.L.2
Masucci, B.3
-
26
-
-
80052169483
-
Multi-use unidirectional proxy re-encryption
-
Shao, J., Liu, P., Cao, Z., Wei, G.: Multi-use unidirectional proxy re-encryption. In: Proceedings of IEEE International Conference on Communications (ICC), pp. 1-5 (2011)
-
(2011)
Proceedings of IEEE International Conference on Communications (ICC)
, pp. 1-5
-
-
Shao, J.1
Liu, P.2
Cao, Z.3
Wei, G.4
-
27
-
-
0036187601
-
A time-bound cryptographic key assignment scheme for access control in a hierarchy
-
Tzeng, W.-G.: A time-bound cryptographic key assignment scheme for access control in a hierarchy. IEEE Transactions on Knowledge and Data Engineering (TKDE) 14(1), 182-188 (2002)
-
(2002)
IEEE Transactions on Knowledge and Data Engineering (TKDE)
, vol.14
, Issue.1
, pp. 182-188
-
-
Tzeng, W.-G.1
-
28
-
-
77958151362
-
Multi-use and unidirectional identity-based proxy re-encryption schemes
-
Wang, H., Cao, Z., Wang, L.: Multi-use and unidirectional identity-based proxy re-encryption schemes. Information Sciences 180(20), 4042-4059 (2010)
-
(2010)
Information Sciences
, vol.180
, Issue.20
, pp. 4042-4059
-
-
Wang, H.1
Cao, Z.2
Wang, L.3
-
29
-
-
0033893174
-
Secure group communications using key graphs
-
Wong, C.K., Gouda, M.G., Lam, S.S.: Secure group communications using key graphs. IEEE/ACM Transactions on Network 8(1), 16-30 (2000)
-
(2000)
IEEE/ACM Transactions on Network
, vol.8
, Issue.1
, pp. 16-30
-
-
Wong, C.K.1
Gouda, M.G.2
Lam, S.S.3
-
30
-
-
77953310709
-
Achieving secure, scalable, and fine-grained data access control in cloud computing
-
Yu, S., Wang, C., Ren, K., Lou, W.: Achieving secure, scalable, and fine-grained data access control in cloud computing. In: Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), pp. 534-542 (2010)
-
(2010)
Proceedings of the IEEE International Conference on Computer Communications (INFOCOM)
, pp. 534-542
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
31
-
-
0036920852
-
A practical key management scheme for access control in a user hierarchy
-
Zhong, S.: A practical key management scheme for access control in a user hierarchy. Computers & Security 21(8), 750-759 (2002)
-
(2002)
Computers & Security
, vol.21
, Issue.8
, pp. 750-759
-
-
Zhong, S.1
|