메뉴 건너뛰기




Volumn 269, Issue , 2014, Pages 270-285

A secure effective key management scheme for dynamic access control in a large leaf class hierarchy

Author keywords

Access control; Hash function; Hierarchy; Key management; Security; Symmetric key cryptosystem

Indexed keywords

HASH FUNCTIONS; PUBLIC KEY CRYPTOGRAPHY;

EID: 84897055589     PISSN: 00200255     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ins.2013.10.022     Document Type: Article
Times cited : (50)

References (28)
  • 1
    • 84897057304 scopus 로고    scopus 로고
    • Advanced Encryption Standard. FIPS PUB 197, National Institute of Standards and Technology (NIST), U.S. Department of Commerce, November (accessed on November 2010)
    • Advanced Encryption Standard. FIPS PUB 197, National Institute of Standards and Technology (NIST), U.S. Department of Commerce, November 2001 < http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf > (accessed on November 2010).
    • (2001)
  • 2
    • 84976752387 scopus 로고
    • Cryptographic solution to a problem of access control in a hierarchy
    • S.G. Akl, and P.D. Taylor Cryptographic solution to a problem of access control in a hierarchy ACM Transactions on Computer Systems (TOCS) 1 3 1983 239 248
    • (1983) ACM Transactions on Computer Systems (TOCS) , vol.1 , Issue.3 , pp. 239-248
    • Akl, S.G.1    Taylor, P.D.2
  • 5
    • 34948898634 scopus 로고    scopus 로고
    • Access control in user hierarchy based on elliptic curve cryptosystem
    • Y.F. Chung, H.H. Lee, F. Lai, and T.S. Chen Access control in user hierarchy based on elliptic curve cryptosystem Information Sciences 178 1 2008 230 243
    • (2008) Information Sciences , vol.178 , Issue.1 , pp. 230-243
    • Chung, Y.F.1    Lee, H.H.2    Lai, F.3    Chen, T.S.4
  • 6
    • 84860729708 scopus 로고    scopus 로고
    • A random key establishment scheme for multi-phase deployment in large-scale distributed sensor networks
    • A.K. Das A random key establishment scheme for multi-phase deployment in large-scale distributed sensor networks International Journal of Information Security 11 3 2012 189 211
    • (2012) International Journal of Information Security , vol.11 , Issue.3 , pp. 189-211
    • Das, A.K.1
  • 7
    • 84890560968 scopus 로고    scopus 로고
    • A secure and effective user authentication and privacy preserving protocol with smart cards for wireless communications
    • A.K. Das A secure and effective user authentication and privacy preserving protocol with smart cards for wireless communications Networking Science 2 1-2 2013 12 27
    • (2013) Networking Science , vol.2 , Issue.12 , pp. 12-27
    • Das, A.K.1
  • 8
    • 84862699099 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of an access control in user hierarchy based on elliptic curve cryptosystem
    • A.K. Das, N.R. Paul, and L. Tripathy Cryptanalysis and improvement of an access control in user hierarchy based on elliptic curve cryptosystem Information Sciences 209 2012 80 92
    • (2012) Information Sciences , vol.209 , pp. 80-92
    • Das, A.K.1    Paul, N.R.2    Tripathy, L.3
  • 9
    • 80054086407 scopus 로고    scopus 로고
    • A cryptographic key assignment scheme for access control in poset ordered hierarchies with enhanced security
    • D. Giri, and P.D. Srivastava A cryptographic key assignment scheme for access control in poset ordered hierarchies with enhanced security International Journal of Network Security 7 2 2008 223 234
    • (2008) International Journal of Network Security , vol.7 , Issue.2 , pp. 223-234
    • Giri, D.1    Srivastava, P.D.2
  • 10
    • 0000954459 scopus 로고
    • A cryptographic key generation scheme for multilevel data security
    • L. Harn, and H.Y. Lin A cryptographic key generation scheme for multilevel data security Computers & Security 9 6 1990 539 546
    • (1990) Computers & Security , vol.9 , Issue.6 , pp. 539-546
    • Harn, L.1    Lin, H.Y.2
  • 11
    • 24644472459 scopus 로고    scopus 로고
    • Improvement on the flexible tree-based key management framework
    • M.-S. Hwang, J.-W. Lo, and C.-H. Liu Improvement on the flexible tree-based key management framework Computers & Security 24 6 2005 500 504
    • (2005) Computers & Security , vol.24 , Issue.6 , pp. 500-504
    • Hwang, M.-S.1    Lo, J.-W.2    Liu, C.-H.3
  • 12
    • 0038053203 scopus 로고    scopus 로고
    • Controlling access in large partially ordered hierarchies using cryptographic keys
    • M.-S. Hwang, and W.-P. Yang Controlling access in large partially ordered hierarchies using cryptographic keys Journal of Systems and Software 67 2 2003 99 107
    • (2003) Journal of Systems and Software , vol.67 , Issue.2 , pp. 99-107
    • Hwang, M.-S.1    Yang, W.-P.2
  • 13
    • 33745856988 scopus 로고    scopus 로고
    • An efficient key-management scheme for hierarchical access control based on elliptic curve cryptosystem
    • F.G. Jeng, and C.M. Wang An efficient key-management scheme for hierarchical access control based on elliptic curve cryptosystem Journal of Systems and Software 79 8 2006 1161 1167
    • (2006) Journal of Systems and Software , vol.79 , Issue.8 , pp. 1161-1167
    • Jeng, F.G.1    Wang, C.M.2
  • 14
    • 0344089052 scopus 로고    scopus 로고
    • A new key assignment scheme for enforcing complicated access control policies in hierarchy
    • I.-C. Lin, M.-S. Hwang, and C.-C. Chang A new key assignment scheme for enforcing complicated access control policies in hierarchy Future Generation Computer Systems 19 4 2003 457 462
    • (2003) Future Generation Computer Systems , vol.19 , Issue.4 , pp. 457-462
    • Lin, I.-C.1    Hwang, M.-S.2    Chang, C.-C.3
  • 15
    • 2342477274 scopus 로고    scopus 로고
    • Efficient access control and key management schemes for mobile agents
    • I.-C. Lin, H.-H. Ou, and M.-S. Hwang Efficient access control and key management schemes for mobile agents Computer Standards & Interfaces 26 5 2004 423 433
    • (2004) Computer Standards & Interfaces , vol.26 , Issue.5 , pp. 423-433
    • Lin, I.-C.1    Ou, H.-H.2    Hwang, M.-S.3
  • 16
    • 79751531498 scopus 로고    scopus 로고
    • Secure key management scheme for dynamic hierarchical access control based on ECC
    • Y.-L. Lin, and C.-L. Hsu Secure key management scheme for dynamic hierarchical access control based on ECC Journal of Systems and Software 84 4 2011 679 685
    • (2011) Journal of Systems and Software , vol.84 , Issue.4 , pp. 679-685
    • Lin, Y.-L.1    Hsu, C.-L.2
  • 17
    • 78649817331 scopus 로고    scopus 로고
    • An efficient key assignment scheme for access control in a large leaf class hierarchy
    • J.-W. Lo, M.-S. Hwang, and C.-H. Liu An efficient key assignment scheme for access control in a large leaf class hierarchy Information Sciences 181 2011 917 925
    • (2011) Information Sciences , vol.181 , pp. 917-925
    • Lo, J.-W.1    Hwang, M.-S.2    Liu, C.-H.3
  • 18
    • 84867860941 scopus 로고    scopus 로고
    • Secure Communication of Medical Information sing Mobile Agents
    • M. Nikooghadam, and A. Zakerolhosseini Secure Communication of Medical Information sing Mobile Agents Journal of Medical Systems 36 6 2012 3839 3850
    • (2012) Journal of Medical Systems , vol.36 , Issue.6 , pp. 3839-3850
    • Nikooghadam, M.1    Zakerolhosseini, A.2
  • 19
    • 77956061440 scopus 로고    scopus 로고
    • Efficient utilization of elliptic curve cryptosystem for hierarchical access control
    • M. Nikooghadam, A. Zakerolhosseini, and M.E. Moghaddam Efficient utilization of elliptic curve cryptosystem for hierarchical access control Journal of Systems and Software 83 10 2010 1917 1929
    • (2010) Journal of Systems and Software , vol.83 , Issue.10 , pp. 1917-1929
    • Nikooghadam, M.1    Zakerolhosseini, A.2    Moghaddam, M.E.3
  • 20
    • 0023962708 scopus 로고
    • Cryptographic implementation of a tree hierarchy for access control
    • R.S. Sandhu Cryptographic implementation of a tree hierarchy for access control Information Processing Letters 27 2 1988 95 98
    • (1988) Information Processing Letters , vol.27 , Issue.2 , pp. 95-98
    • Sandhu, R.S.1
  • 21
    • 33847696259 scopus 로고    scopus 로고
    • Access control in networks hierarchy: Implementation of key management protocol
    • N. Sklavos, and O. Koufopavlou Access control in networks hierarchy: implementation of key management protocol International Journal of Network Security 1 2 2005 103 109
    • (2005) International Journal of Network Security , vol.1 , Issue.2 , pp. 103-109
    • Sklavos, N.1    Koufopavlou, O.2
  • 23
    • 0003629991 scopus 로고
    • FIPS PUB 180-1 National Institute of Standards and Technology (NIST), U.S. Department of Commerce, April
    • Secure Hash Standard, FIPS PUB 180-1, National Institute of Standards and Technology (NIST), U.S. Department of Commerce, April 1995.
    • (1995) Secure Hash Standard
  • 24
    • 78649850078 scopus 로고    scopus 로고
    • A novel key management scheme for dynamic access control in a hierarchy
    • S.-F. Tzeng, C.-C. Lee, and T.-C. Lin A novel key management scheme for dynamic access control in a hierarchy International Journal of Network Security 12 3 2011 178 180
    • (2011) International Journal of Network Security , vol.12 , Issue.3 , pp. 178-180
    • Tzeng, S.-F.1    Lee, C.-C.2    Lin, T.-C.3
  • 25
    • 9544234465 scopus 로고    scopus 로고
    • Cryptanalysis of Hwang-Yang scheme for controlling access in large partially ordered hierarchies
    • S.-Y. Wang, and C.-S. Laih Cryptanalysis of Hwang-Yang scheme for controlling access in large partially ordered hierarchies Journal of Systems and Software 75 2005 189 192
    • (2005) Journal of Systems and Software , vol.75 , pp. 189-192
    • Wang, S.-Y.1    Laih, C.-S.2
  • 26
    • 84873031582 scopus 로고    scopus 로고
    • An efficient key-management scheme for hierarchical access control in e-medicine system
    • S. Wu, and K. Chen An efficient key-management scheme for hierarchical access control in e-medicine system Journal of Medical Systems 36 4 2012 2325 2337
    • (2012) Journal of Medical Systems , vol.36 , Issue.4 , pp. 2325-2337
    • Wu, S.1    Chen, K.2
  • 27
    • 10644259523 scopus 로고    scopus 로고
    • Access control in a hierarchy using one-way hash functions
    • C. Yang, and C. Li Access control in a hierarchy using one-way hash functions Computers & Security 23 8 2004 659 664
    • (2004) Computers & Security , vol.23 , Issue.8 , pp. 659-664
    • Yang, C.1    Li, C.2
  • 28
    • 78649878982 scopus 로고    scopus 로고
    • A key management scheme for hierarchical access control in group communication
    • Q. Zhang, Y. Wang, and J.P. Jue A key management scheme for hierarchical access control in group communication International Journal of Network Security 7 3 2008 323 334
    • (2008) International Journal of Network Security , vol.7 , Issue.3 , pp. 323-334
    • Zhang, Q.1    Wang, Y.2    Jue, J.P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.