On some cryptographic solutions for access control in a tree hierarchy
ACM '87 Proceedings of the 1987 Fall Joint Computer Conference on Exploring technology: today and tomorrow
Membership authentication for hierarchical multigroups using the extended Fiat-Shamir scheme
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Flexible access control with master keys
CRYPTO '89 Proceedings on Advances in cryptology
A cryptographic solution to implement access control in a hierarchy and more
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
A Time-Bound Cryptographic Key Assignment Scheme for Access Control in a Hierarchy
IEEE Transactions on Knowledge and Data Engineering
A new dynamic key generation scheme for access control in a hierarchy
Nordic Journal of Computing
Chinese Remainder Theorem Based Hierarchical Access Control for Secure Group Communication
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
A new key assignment scheme for enforcing complicated access control policies in hierarchy
Future Generation Computer Systems - Selected papers from CCGRID 2002
Key assignment for enforcing access control policy exceptions in distributed systems
Information Sciences: an International Journal
Controlling access in large partially ordered hierarchies using cryptographic keys
Journal of Systems and Software
A Novel Key Management Scheme for Dynamic Access Control in a User Hierarchy
COMPSAC '04 Proceedings of the 28th Annual International Computer Software and Applications Conference - Volume 01
Cryptographic key assignment schemes for any access control policy
Information Processing Letters
Hierarchical key management scheme using polynomial interpolation
ACM SIGOPS Operating Systems Review
Dynamic and efficient key management for access hierarchies
Proceedings of the 12th ACM conference on Computer and communications security
Key management for multi-user encrypted databases
Proceedings of the 2005 ACM workshop on Storage security and survivability
Applying hierarchical and role-based access control to XML documents
SWS '04 Proceedings of the 2004 workshop on Secure web service
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Key management for non-tree access hierarchies
Proceedings of the eleventh ACM symposium on Access control models and technologies
Journal of Systems and Software
Unconditionally secure key assignment schemes
Discrete Applied Mathematics - Special issue: Coding and cryptography
Key management for role hierarchy in distributed systems
Journal of Network and Computer Applications
Tolerant Key Assignment for Enforcing Complicated Access Control Policies in a Hierarchy
Fundamenta Informaticae
Key management for content access control in a hierarchy
Computer Networks: The International Journal of Computer and Telecommunications Networking
Access control in user hierarchy based on elliptic curve cryptosystem
Information Sciences: an International Journal
A dynamic key management solution to access hierarchy
International Journal of Network Management
On replacing cryptographic keys in hierarchical key management systems
Journal of Computer Security - The Third IEEE International Symposium on Security in Networks and Distributed Systems
New constructions for provably-secure time-bound hierarchical key assignment schemes
Theoretical Computer Science
Group Key Management: From a Non-hierarchical to a Hierarchical Structure
INDOCRYPT '08 Proceedings of the 9th International Conference on Cryptology in India: Progress in Cryptology
Variations on a theme by Akl and Taylor: Security and tradeoffs
Theoretical Computer Science
Enforcing non-hierarchical access policies by hierarchical key assignment schemes
Information Processing Letters
Unconditionally secure key assignment schemes
Discrete Applied Mathematics - Special issue: Coding and cryptography
Cryptographic key assignment schemes for any access control policy
Information Processing Letters
Design of a lattice-based access control scheme
SMC'09 Proceedings of the 2009 IEEE international conference on Systems, Man and Cybernetics
Encryption policies for regulating access to outsourced data
ACM Transactions on Database Systems (TODS)
Data privacy - problems and solutions
ICISS'07 Proceedings of the 3rd international conference on Information systems security
Efficient utilization of elliptic curve cryptosystem for hierarchical access control
Journal of Systems and Software
An efficient key assignment scheme for access control in a large leaf class hierarchy
Information Sciences: an International Journal
Secure key management scheme for dynamic hierarchical access control based on ECC
Journal of Systems and Software
Enforcement of non-hierarchical access policies
ICCOM'06 Proceedings of the 10th WSEAS international conference on Communications
Efficient provably-secure hierarchical key assignment schemes
Theoretical Computer Science
Provably secure key assignment schemes from factoring
ACISP'11 Proceedings of the 16th Australasian conference on Information security and privacy
A new key assignment scheme for access control in a complete tree hierarchy
WCC'05 Proceedings of the 2005 international conference on Coding and Cryptography
New key management systems for multilevel security
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II
Metadata management in outsourced encrypted databases
SDM'05 Proceedings of the Second VDLB international conference on Secure Data Management
Key management for role hierarchy in distributed systems
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
EuroPKI 2006 Proceedings of the Third European conference on Public Key Infrastructure: theory and Practice
A cryptographic solution for general access control
ISC'05 Proceedings of the 8th international conference on Information Security
Enforcing the security of a time-bound hierarchical key assignment scheme
Information Sciences: an International Journal
An access control scheme for partially ordered set hierarchy with provable security
SAC'05 Proceedings of the 12th international conference on Selected Areas in Cryptography
Research: Dynamic key management schemes for access control in a hierarchy
Computer Communications
A cryptographic key assignment scheme in a hierarchy for access control
Mathematical and Computer Modelling: An International Journal
Research note: Comments on `dynamic key management schemes for access control in a hierarchy'
Computer Communications
Information Sciences: an International Journal
A Novel Cryptographic Key Assignment Scheme with ID-Based Access Control in a Hierachy
Fundamenta Informaticae
Tolerant Key Assignment for Enforcing Complicated Access Control Policies in a Hierarchy
Fundamenta Informaticae
Simple, efficient and strongly KI-Secure hierarchical key assignment schemes
CT-RSA'13 Proceedings of the 13th international conference on Topics in Cryptology
A generic algebraic model for the analysis of cryptographic-key assignment schemes
FPS'12 Proceedings of the 5th international conference on Foundations and Practice of Security
CloudHKA: a cryptographic approach for hierarchical access control in cloud computing
ACNS'13 Proceedings of the 11th international conference on Applied Cryptography and Network Security
Hi-index | 14.99 |
A cryptographic scheme for controlling access to information within a group of users organized in a hierarchy was proposed in [1]. The scheme enables a user at some level to compute from his own cryptographic key the keys of the users below him in the organization.