An Optimal Algorithm for Assigning Cryptographic Keys to Control Access in a Hierarchy
IEEE Transactions on Computers
Operation systems: advanced concepts
Operation systems: advanced concepts
Cryptographic implementation of a tree hierarchy for access control
Information Processing Letters
A cryptographic key generation scheme for multilevel data security
Computers and Security
Cryptographic key assignment scheme for access control in a hierarchy
Information Systems
Hierarchy representations based on arithmetic coding for dynamic information protection systems
Information Sciences: an International Journal
A scheme to determine the relationship between two users in a hierarchy
Computers and Security
A database encryption system with subkeys
ACM Transactions on Database Systems (TODS)
Cryptographic solution to a problem of access control in a hierarchy
ACM Transactions on Computer Systems (TOCS)
Chinese Remainder Theorem Based Hierarchical Access Control for Secure Group Communication
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
An efficient key assignment scheme based on one-way hash function in a user hierarchy
Journal of Computer Science and Technology
A Novel Key Management Scheme for Dynamic Access Control in a User Hierarchy
COMPSAC '04 Proceedings of the 28th Annual International Computer Software and Applications Conference - Volume 01
Cryptographic key assignment schemes for any access control policy
Information Processing Letters
Unconditionally secure key assignment schemes
Discrete Applied Mathematics - Special issue: Coding and cryptography
Provably-secure time-bound hierarchical key assignment schemes
Proceedings of the 13th ACM conference on Computer and communications security
Dual-Level Key Management for secure grid communication in dynamic and hierarchical groups
Future Generation Computer Systems
Access control in user hierarchy based on elliptic curve cryptosystem
Information Sciences: an International Journal
A dynamic key management solution to access hierarchy
International Journal of Network Management
Efficient key management for cryptographically enforced access control
Computer Standards & Interfaces
New constructions for provably-secure time-bound hierarchical key assignment schemes
Theoretical Computer Science
Efficient migration access control for mobile agents
Computer Standards & Interfaces
Unconditionally secure key assignment schemes
Discrete Applied Mathematics - Special issue: Coding and cryptography
Cryptographic key assignment schemes for any access control policy
Information Processing Letters
Design of a lattice-based access control scheme
SMC'09 Proceedings of the 2009 IEEE international conference on Systems, Man and Cybernetics
Scalable key management for secure multicast communication in the mobile environment
Pervasive and Mobile Computing
Efficient provably-secure hierarchical key assignment schemes
Theoretical Computer Science
A new key assignment scheme for access control in a complete tree hierarchy
WCC'05 Proceedings of the 2005 international conference on Coding and Cryptography
A novel hierarchical key management scheme based on quadratic residues
ISPA'04 Proceedings of the Second international conference on Parallel and Distributed Processing and Applications
Enforcing the security of a time-bound hierarchical key assignment scheme
Information Sciences: an International Journal
Detecting flaws in dynamic hierarchical key management schemes using specification animation
ICDCIT'12 Proceedings of the 8th international conference on Distributed Computing and Internet Technology
Research note: Comments on `dynamic key management schemes for access control in a hierarchy'
Computer Communications
Information Sciences: an International Journal
Hi-index | 0.25 |
Secure access control in user hierarchy is designed such that users are authorized and classified into different privilege classes. A user belonging to a higher-privileged class will have access rights to messages created or owned by users in a lower-privileged class; while the opposite is not allowed. Methods for generating cryptographic keys to security classes can be categorized as the key assignment approach and the key management approach. In this paper, we shall propose a new hierarchical access control mechanism which possesses the advantages of the two approaches. Dynamic operations, such as class insertions or class deletions and key changes, etc., can be fulfilled efficiently. Besides, it is easy for an ancestor to deduce the key of his descendants which is positioned in a far-lower-privileged class.