An Optimal Algorithm for Assigning Cryptographic Keys to Control Access in a Hierarchy
IEEE Transactions on Computers
Cryptographic implementation of a tree hierarchy for access control
Information Processing Letters
A cryptographic key generation scheme for multilevel data security
Computers and Security
Cryptographic key assignment scheme for access control in a hierarchy
Information Systems
Cryptographic solution to a problem of access control in a hierarchy
ACM Transactions on Computer Systems (TOCS)
A new dynamic key generation scheme for access control in a hierarchy
Nordic Journal of Computing
A new key assignment scheme for enforcing complicated access control policies in hierarchy
Future Generation Computer Systems - Selected papers from CCGRID 2002
Controlling access in large partially ordered hierarchies using cryptographic keys
Journal of Systems and Software
Cryptographic key assignment schemes for any access control policy
Information Processing Letters
Unconditionally secure key assignment schemes
Discrete Applied Mathematics - Special issue: Coding and cryptography
Provably-secure time-bound hierarchical key assignment schemes
Proceedings of the 13th ACM conference on Computer and communications security
Tolerant Key Assignment for Enforcing Complicated Access Control Policies in a Hierarchy
Fundamenta Informaticae
New constructions for provably-secure time-bound hierarchical key assignment schemes
Theoretical Computer Science
Unconditionally secure key assignment schemes
Discrete Applied Mathematics - Special issue: Coding and cryptography
Cryptographic key assignment schemes for any access control policy
Information Processing Letters
Efficient provably-secure hierarchical key assignment schemes
Theoretical Computer Science
A new key assignment scheme for access control in a complete tree hierarchy
WCC'05 Proceedings of the 2005 international conference on Coding and Cryptography
Enforcing the security of a time-bound hierarchical key assignment scheme
Information Sciences: an International Journal
Tolerant Key Assignment for Enforcing Complicated Access Control Policies in a Hierarchy
Fundamenta Informaticae
Hi-index | 0.98 |
Access control is one of the mechanisms for data protection in a computer system. Many literatures based on cryptography have been proposed to solve the problem of access control in hierarchic structures. Recently, Liaw and Lei proposed an optimal heuristic algorithm for multilevel data security. But, their heuristic algorithm can only be used in a tree structure, which it is a special case of a partially-ordered hierarchy. In this article, we present a modification of their algorithm that enables the algorithm to be used in a partially-ordered structure.