메뉴 건너뛰기




Volumn 7954 LNCS, Issue , 2013, Pages 37-52

CloudHKA: A cryptographic approach for hierarchical access control in cloud computing

Author keywords

Access control; Bell LaPadula security model; cloud computing; hierarchical key assignment; key management; outsourced data; proxy re encryption

Indexed keywords

HIERARCHICAL KEY ASSIGNMENT; KEY MANAGEMENT; OUTSOURCED DATUM; PROXY RE ENCRYPTIONS; SECURITY MODEL;

EID: 84879857216     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-38980-1_3     Document Type: Conference Paper
Times cited : (27)

References (31)
  • 1
    • 84976752387 scopus 로고
    • Cryptographic solution to a problem of access control in a hierarchy
    • Akl, S.G., Taylor, P.D.: Cryptographic solution to a problem of access control in a hierarchy. ACM Transactions on Computer Systems 1(3), 239-248 (1983)
    • (1983) ACM Transactions on Computer Systems , vol.1 , Issue.3 , pp. 239-248
    • Akl, S.G.1    Taylor, P.D.2
  • 7
    • 84957718934 scopus 로고    scopus 로고
    • Divertible protocols and atomic proxy cryptography
    • Advances in Cryptology - EUROCRYPT '98
    • Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127-144. Springer, Heidelberg (1998) (Pubitemid 128081481)
    • (1998) LECTURE NOTES IN COMPUTER SCIENCE , Issue.1403 , pp. 127-144
    • Blaze, M.1    Bleumer, G.2    Strauss, M.3
  • 10
    • 84922053594 scopus 로고    scopus 로고
    • Cloudhka: A cryptographic approach for hierarchical access control in cloud computing
    • Report 2013/208
    • Chen, Y.-R., Chu, C.-K., Tzeng, W.-G., Zhou, J.: Cloudhka: A cryptographic approach for hierarchical access control in cloud computing. Cryptology ePrint Archive, Report 2013/208 (2013), http://eprint.iacr.org/
    • (2013) Cryptology ePrint Archive
    • Chen, Y.-R.1    Chu, C.-K.2    Tzeng, W.-G.3    Zhou, J.4
  • 15
    • 38049061546 scopus 로고    scopus 로고
    • Identity-based proxy re-encryption
    • Katz, J., Yung, M. (eds.) ACNS 2007. Springer, Heidelberg
    • Green, M., Ateniese, G.: Identity-based proxy re-encryption. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 288-306. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4521 , pp. 288-306
    • Green, M.1    Ateniese, G.2
  • 17
    • 0000954459 scopus 로고
    • A cryptographic key generation scheme for multilevel data security
    • Harn, L., Lin, H.-Y.: A cryptographic key generation scheme for multilevel data security. Computers & Security 9(6), 539-546 (1990)
    • (1990) Computers & Security , vol.9 , Issue.6 , pp. 539-546
    • Harn, L.1    Lin, H.-Y.2
  • 18
    • 79957585981 scopus 로고    scopus 로고
    • Attribute-based access control with efficient revocation in data outsourcing systems
    • Hur, J., Noh, D.K.: Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Transactions on Parallel and Distributed Systems 22(7), 1214-1221 (2011)
    • (2011) IEEE Transactions on Parallel and Distributed Systems , vol.22 , Issue.7 , pp. 1214-1221
    • Hur, J.1    Noh, D.K.2
  • 19
    • 84864644840 scopus 로고    scopus 로고
    • Fully secure unidirectional identity-based proxy reencryption
    • Kim, H. (ed.) ICISC 2011. Springer, Heidelberg
    • Luo, S., Shen, Q., Chen, Z.: Fully secure unidirectional identity-based proxy reencryption. In: Kim, H. (ed.) ICISC 2011. LNCS, vol. 7259, pp. 109-126. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7259 , pp. 109-126
    • Luo, S.1    Shen, Q.2    Chen, Z.3
  • 20
    • 0022115074 scopus 로고
    • An optimal algorithm for assigning cryptographic keys to control access in a hierarchy
    • MacKinnon, S.J., Taylor, P.D., Meijer, H., Akl, S.G.: An optimal algorithm for assigning cryptographic keys to control access in a hierarchy. IEEE Transactions on Computers 34(9), 797-802 (1985)
    • (1985) IEEE Transactions on Computers , vol.34 , Issue.9 , pp. 797-802
    • MacKinnon, S.J.1    Taylor, P.D.2    Meijer, H.3    Akl, S.G.4
  • 22
    • 84947912552 scopus 로고    scopus 로고
    • All-or-nothing encryption and the package transform
    • Biham, E. (ed.) FSE 1997. Springer, Heidelberg
    • Rivest, R.L.: All-or-nothing encryption and the package transform. In: Biham, E. (ed.) FSE 1997. LNCS, vol. 1267, pp. 210-218. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1267 , pp. 210-218
    • Rivest, R.L.1
  • 23
    • 84865465739 scopus 로고    scopus 로고
    • Dynamic credentials and ciphertext delegation for attribute-based encryption
    • Safavi-Naini, R. (ed.) CRYPTO 2012. Springer, Heidelberg
    • Sahai, A., Seyalioglu, H., Waters, B.: Dynamic credentials and ciphertext delegation for attribute-based encryption. In: Safavi-Naini, R. (ed.) CRYPTO 2012. LNCS, vol. 7417, pp. 199-217. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7417 , pp. 199-217
    • Sahai, A.1    Seyalioglu, H.2    Waters, B.3
  • 24
    • 24944554962 scopus 로고    scopus 로고
    • Fuzzy identity-based encryption
    • Cramer, R. (ed.) EUROCRYPT 2005. Springer, Heidelberg
    • Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457-473. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 457-473
    • Sahai, A.1    Waters, B.2
  • 25
    • 80052271043 scopus 로고    scopus 로고
    • Efficient provably-secure hierarchical key assignment schemes
    • De Santis, A., Ferrara, A.L., Masucci, B.: Efficient provably-secure hierarchical key assignment schemes. Theoretical Computer Science 412(41), 5684-5699 (2011)
    • (2011) Theoretical Computer Science , vol.412 , Issue.41 , pp. 5684-5699
    • De Santis, A.1    Ferrara, A.L.2    Masucci, B.3
  • 27
    • 0036187601 scopus 로고    scopus 로고
    • A time-bound cryptographic key assignment scheme for access control in a hierarchy
    • Tzeng, W.-G.: A time-bound cryptographic key assignment scheme for access control in a hierarchy. IEEE Transactions on Knowledge and Data Engineering (TKDE) 14(1), 182-188 (2002)
    • (2002) IEEE Transactions on Knowledge and Data Engineering (TKDE) , vol.14 , Issue.1 , pp. 182-188
    • Tzeng, W.-G.1
  • 28
    • 77958151362 scopus 로고    scopus 로고
    • Multi-use and unidirectional identity-based proxy re-encryption schemes
    • Wang, H., Cao, Z., Wang, L.: Multi-use and unidirectional identity-based proxy re-encryption schemes. Information Sciences 180(20), 4042-4059 (2010)
    • (2010) Information Sciences , vol.180 , Issue.20 , pp. 4042-4059
    • Wang, H.1    Cao, Z.2    Wang, L.3
  • 31
    • 0036920852 scopus 로고    scopus 로고
    • A practical key management scheme for access control in a user hierarchy
    • Zhong, S.: A practical key management scheme for access control in a user hierarchy. Computers & Security 21(8), 750-759 (2002)
    • (2002) Computers & Security , vol.21 , Issue.8 , pp. 750-759
    • Zhong, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.