메뉴 건너뛰기




Volumn 2014, Issue , 2014, Pages

An efficient solution for hierarchical access control problem in cloud environment

Author keywords

[No Author keywords available]

Indexed keywords

DISTRIBUTED COMPUTER SYSTEMS; HIERARCHICAL SYSTEMS; NETWORK SECURITY;

EID: 84911091131     PISSN: 1024123X     EISSN: 15635147     Source Type: Journal    
DOI: 10.1155/2014/569397     Document Type: Article
Times cited : (11)

References (27)
  • 1
    • 84976752387 scopus 로고
    • Cryptographic solution to a problem of access control in a hierarchy
    • Akl S. G., Taylor P. D., Cryptographic solution to a problem of access control in a hierarchy. ACM Transactions on Computer Systems 1983 1 3 239 248 10.1145/357369.357372
    • (1983) ACM Transactions on Computer Systems , vol.1 , Issue.3 , pp. 239-248
    • Akl, S.G.1    Taylor, P.D.2
  • 2
    • 0033334588 scopus 로고    scopus 로고
    • Cryptographic key assignment scheme for dynamic access control in a user hierarchy
    • Kuo F., Shen V., Chen T., Lai F., Cryptographic key assignment scheme for dynamic access control in a user hierarchy. IEE Proceedings-Computers and Digital Techniques 146 5 235 240 10.1049/ip-cdt:19990311
    • IEE Proceedings - Computers and Digital Techniques , vol.146 , Issue.5 , pp. 235-240
    • Kuo, F.1    Shen, V.2    Chen, T.3    Lai, F.4
  • 3
    • 0001692137 scopus 로고
    • Cryptographic key assignment scheme for access control in a hierarchy
    • 2-s2.0-0001692137
    • Chang C.-C., Hwang R.-J., Wu T.-C., Cryptographic key assignment scheme for access control in a hierarchy. Information Systems 1992 17 3 243 247 10.1016/0306-4379(92)90015-F 2-s2.0-0001692137
    • (1992) Information Systems , vol.17 , Issue.3 , pp. 243-247
    • Chang, C.-C.1    Hwang, R.-J.2    Wu, T.-C.3
  • 4
    • 5744237343 scopus 로고    scopus 로고
    • Cryptographic key assignment schemes for any access control policy
    • 2-s2.0-5744237343
    • de Santis A., Ferrara A. L., Masucci B., Cryptographic key assignment schemes for any access control policy. Information Processing Letters 2004 92 4 199 205 10.1016/j.ipl.2004.03.019 MR2094859 2-s2.0-5744237343
    • (2004) Information Processing Letters , vol.92 , Issue.4 , pp. 199-205
    • De Santis, A.1    Ferrara, A.L.2    Masucci, B.3
  • 5
    • 0344089052 scopus 로고    scopus 로고
    • A new key assignment scheme for enforcing complicated access control policies in hierarchy
    • 2-s2.0-0344089052
    • Lin I.-C., Hwang M.-S., Chang C.-C., A new key assignment scheme for enforcing complicated access control policies in hierarchy. Future Generation Computer Systems 2003 19 4 457 462 2-s2.0-0344089052 10.1016/S0167-739X(02)00200-5
    • (2003) Future Generation Computer Systems , vol.19 , Issue.4 , pp. 457-462
    • Lin, I.-C.1    Hwang, M.-S.2    Chang, C.-C.3
  • 6
    • 13844281059 scopus 로고    scopus 로고
    • Efficient time-bound hierarchical key assignment scheme
    • 2-s2.0-13844281059
    • Chen H.-Y., Efficient time-bound hierarchical key assignment scheme. IEEE Transactions on Knowledge and Data Engineering 2004 16 10 1301 1304 10.1109/TKDE.2004.59 2-s2.0-13844281059
    • (2004) IEEE Transactions on Knowledge and Data Engineering , vol.16 , Issue.10 , pp. 1301-1304
    • Chen, H.-Y.1
  • 7
    • 43649095362 scopus 로고    scopus 로고
    • An efficient time-bound hierarchical key management scheme for secure broadcasting
    • 2-s2.0-43649095362
    • Bertino E., Shang N., Wagstaff S. S. Jr., An efficient time-bound hierarchical key management scheme for secure broadcasting. IEEE Transactions on Dependable and Secure Computing 2008 5 2 65 70 10.1109/TDSC.2007.70241 2-s2.0-43649095362
    • (2008) IEEE Transactions on Dependable and Secure Computing , vol.5 , Issue.2 , pp. 65-70
    • Bertino, E.1    Shang, N.2    Wagstaff, S.S.3
  • 8
    • 0036187601 scopus 로고    scopus 로고
    • A time-bound cryptographic key assignment scheme for access control in a hierarchy
    • 2-s2.0-0036187601
    • Tzeng W.-G., A time-bound cryptographic key assignment scheme for access control in a hierarchy. IEEE Transactions on Knowledge and Data Engineering 2002 14 1 182 188 10.1109/69.979981 2-s2.0-0036187601
    • (2002) IEEE Transactions on Knowledge and Data Engineering , vol.14 , Issue.1 , pp. 182-188
    • Tzeng, W.-G.1
  • 10
    • 53249115281 scopus 로고    scopus 로고
    • New constructions for provably-secure time-bound hierarchical key assignment schemes
    • 2-s2.0-53249115281
    • de Santis A., Ferrara A. L., Masucci B., New constructions for provably-secure time-bound hierarchical key assignment schemes. Theoretical Computer Science 2008 407 1-3 213 230 10.1016/j.tcs.2008.05.021 MR2463008 2-s2.0-53249115281
    • (2008) Theoretical Computer Science , vol.407 , Issue.1-3 , pp. 213-230
    • De Santis, A.1    Ferrara, A.L.2    Masucci, B.3
  • 13
    • 84896029505 scopus 로고    scopus 로고
    • A secure and efficient t -out-of- n oblivious transfer based on the generalized aryabhata remainder theorem
    • Liu Y., Chang C.-C., Chang S.-C., A secure and efficient t -out-of- n oblivious transfer based on the generalized aryabhata remainder theorem. Journal of Information Hiding and Multimedia Signal Processing 2014 5 2 223 233
    • (2014) Journal of Information Hiding and Multimedia Signal Processing , vol.5 , Issue.2 , pp. 223-233
    • Liu, Y.1    Chang, C.-C.2    Chang, S.-C.3
  • 14
    • 84883433659 scopus 로고    scopus 로고
    • Publicly verifiable multi-secret sharing scheme from bilinear pairings
    • 2-s2.0-84883433659
    • Wu T.-Y., Tseng Y.-M., Publicly verifiable multi-secret sharing scheme from bilinear pairings. IET Information Security 2013 7 3 239 246 10.1049/iet-ifs.2012.0105 2-s2.0-84883433659
    • (2013) IET Information Security , vol.7 , Issue.3 , pp. 239-246
    • Wu, T.-Y.1    Tseng, Y.-M.2
  • 15
    • 84896474654 scopus 로고    scopus 로고
    • Location-based distributed group key agreement scheme for vehicular AD hoc network
    • 759601 2-s2.0-84896474654
    • Wang E. K., Ye Y., Xu X., Location-based distributed group key agreement scheme for vehicular AD hoc network. International Journal of Distributed Sensor Networks 2014 2014 8 759601 10.1155/2014/759601 2-s2.0-84896474654
    • (2014) International Journal of Distributed Sensor Networks , vol.2014 , pp. 8
    • Wang, E.K.1    Ye, Y.2    Xu, X.3
  • 16
    • 84862787823 scopus 로고    scopus 로고
    • RCDA: Recoverable concealed data aggregation for data integrity in wireless sensor networks
    • 2-s2.0-84862787823
    • Chen C.-M., Lin Y.-H., Lin Y.-C., Sun H.-M., RCDA: recoverable concealed data aggregation for data integrity in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems 2012 23 4 727 734 10.1109/TPDS.2011.219 2-s2.0-84862787823
    • (2012) IEEE Transactions on Parallel and Distributed Systems , vol.23 , Issue.4 , pp. 727-734
    • Chen, C.-M.1    Lin, Y.-H.2    Lin, Y.-C.3    Sun, H.-M.4
  • 18
    • 0041347682 scopus 로고    scopus 로고
    • Security of Tzeng's time-bound key assignment scheme for access control in a hierarchy
    • 2-s2.0-0041347682
    • Yi X., Ye Y., Security of Tzeng's time-bound key assignment scheme for access control in a hierarchy. IEEE Transactions on Knowledge and Data Engineering 2003 15 4 1054 1055 10.1109/TKDE.2003.1209023 2-s2.0-0041347682
    • (2003) IEEE Transactions on Knowledge and Data Engineering , vol.15 , Issue.4 , pp. 1054-1055
    • Yi, X.1    Ye, Y.2
  • 19
    • 33947655924 scopus 로고    scopus 로고
    • Security of Chien's efficient time-bound hierarchical key assignment scheme
    • 2-s2.0-33947655924
    • Yi X., Security of Chien's efficient time-bound hierarchical key assignment scheme. IEEE Transactions on Knowledge and Data Engineering 2005 17 9 1298 1299 10.1109/TKDE.2005.152 2-s2.0-33947655924
    • (2005) IEEE Transactions on Knowledge and Data Engineering , vol.17 , Issue.9 , pp. 1298-1299
    • Yi, X.1
  • 20
    • 67649239890 scopus 로고    scopus 로고
    • On the security of an efficient time-bound hierarchical key management scheme
    • 2-s2.0-67649239890
    • Sun H.-M., Wang K.-H., Chen C.-M., On the security of an efficient time-bound hierarchical key management scheme. IEEE Transactions on Dependable and Secure Computing 2009 6 2 159 160 10.1109/TDSC.2009.15 2-s2.0-67649239890
    • (2009) IEEE Transactions on Dependable and Secure Computing , vol.6 , Issue.2 , pp. 159-160
    • Sun, H.-M.1    Wang, K.-H.2    Chen, C.-M.3
  • 21
    • 32844471813 scopus 로고    scopus 로고
    • Merging: An efficient solution for a time-bound hierarchical key assignment scheme
    • 2-s2.0-32844471813
    • Wang S.-Y., Laih C.-S., Merging: an efficient solution for a time-bound hierarchical key assignment scheme. IEEE Transactions on Dependable and Secure Computing 2006 3 1 91 100 10.1109/TDSC.2006.15 2-s2.0-32844471813
    • (2006) IEEE Transactions on Dependable and Secure Computing , vol.3 , Issue.1 , pp. 91-100
    • Wang, S.-Y.1    Laih, C.-S.2
  • 22
    • 80052701910 scopus 로고    scopus 로고
    • Proceedings of the 16th IEEE Symposium on Computers and Communications (ISCC '11) July 2011 2-s2.0-80052701910
    • de Caro A., Iovino V., jPBC: Java pairing based cryptography. Proceedings of the 16th IEEE Symposium on Computers and Communications (ISCC '11) July 2011 850 855 2-s2.0-80052701910 10.1109/ISCC.2011.5983948
    • JPBC: Java Pairing Based Cryptography , pp. 850-855
    • De Caro, A.1    Iovino, V.2
  • 25
    • 78649322624 scopus 로고    scopus 로고
    • A survey on security issues in service delivery models of cloud computing
    • 2-s2.0-78649322624 10.1016/j.jnca.2010.07.006
    • Subashini S., Kavitha V., A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications 2011 34 1 1 11 2-s2.0-78649322624 10.1016/j.jnca.2010.07.006
    • (2011) Journal of Network and Computer Applications , vol.34 , Issue.1 , pp. 1-11
    • Subashini, S.1    Kavitha, V.2
  • 26
    • 79960156981 scopus 로고    scopus 로고
    • Proceedings of the 3rd International Workshop on Intelligent Systems and Applications (ISA '11) May 2011 Wuhan, China 2-s2.0-79960156981
    • Sun B.-J., Wu K.-J., Research on cloud computing application in the peer-to-peer based video-on-demand systems. Proceedings of the 3rd International Workshop on Intelligent Systems and Applications (ISA '11) May 2011 Wuhan, China 1 4 10.1109/ISA.2011.5873337 2-s2.0-79960156981
    • Research on Cloud Computing Application in the Peer-to-peer Based Video-on-demand Systems , pp. 1-4
    • Sun, B.-J.1    Wu, K.-J.2
  • 27
    • 80051870839 scopus 로고    scopus 로고
    • Proceedings of the 31st International Conference on Distributed Computing Systems (ICDCS '11) June 2011 Minneapolis, Minn, USA 10.1109/ICDCS.2011.50 2-s2.0-80051870839
    • Wu Y., Wu C., Li B., Qiu X., Lau F. C. M., CloudMedia: when cloud on demand meets video on demand. Proceedings of the 31st International Conference on Distributed Computing Systems (ICDCS '11) June 2011 Minneapolis, Minn, USA 268 277 10.1109/ICDCS.2011.50 2-s2.0-80051870839
    • CloudMedia: When Cloud on Demand Meets Video on Demand , pp. 268-277
    • Wu, Y.1    Wu, C.2    Li, B.3    Qiu, X.4    Lau, F.C.M.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.