An Optimal Algorithm for Assigning Cryptographic Keys to Control Access in a Hierarchy
IEEE Transactions on Computers
Cryptographic implementation of a tree hierarchy for access control
Information Processing Letters
Mandatory security in object-oriented database systems
OOPSLA '89 Conference proceedings on Object-oriented programming systems, languages and applications
A cryptographic key generation scheme for multilevel data security
Computers and Security
A model of authorization for next-generation database systems
ACM Transactions on Database Systems (TODS)
Membership authentication for hierarchical multigroups using the extended Fiat-Shamir scheme
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Flexible access control with master keys
CRYPTO '89 Proceedings on Advances in cryptology
Database security
Cryptography and network security (2nd ed.): principles and practice
Cryptography and network security (2nd ed.): principles and practice
Cryptographic solution to a problem of access control in a hierarchy
ACM Transactions on Computer Systems (TOCS)
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Mathematics: A Discrete Introduction
Mathematics: A Discrete Introduction
Fundamentals of Database Systems
Fundamentals of Database Systems
Access Control in Object-Oriented Database Systems - Some Approaches and Issues
Advanced Database Systems
The case for access control on XML relationships
Proceedings of the 14th ACM international conference on Information and knowledge management
Dynamic and efficient key management for access hierarchies
Proceedings of the 12th ACM conference on Computer and communications security
Applying hierarchical and role-based access control to XML documents
SWS '04 Proceedings of the 2004 workshop on Secure web service
Key management for non-tree access hierarchies
Proceedings of the eleventh ACM symposium on Access control models and technologies
Unconditionally secure key assignment schemes
Discrete Applied Mathematics - Special issue: Coding and cryptography
Key management for content access control in a hierarchy
Computer Networks: The International Journal of Computer and Telecommunications Networking
Dynamic access-control policies on XML encrypted data
ACM Transactions on Information and System Security (TISSEC)
Client-based access control management for XML documents
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Dynamic and Efficient Key Management for Access Hierarchies
ACM Transactions on Information and System Security (TISSEC)
Group Key Management: From a Non-hierarchical to a Hierarchical Structure
INDOCRYPT '08 Proceedings of the 9th International Conference on Cryptology in India: Progress in Cryptology
Unconditionally secure key assignment schemes
Discrete Applied Mathematics - Special issue: Coding and cryptography
A cryptographic solution for general access control
ISC'05 Proceedings of the 8th international conference on Information Security
Research on multistage interconnection architecture and collision detection model
INTRUST'09 Proceedings of the First international conference on Trusted Systems
An efficient key management scheme for content access control for linear hierarchies
Computer Networks: The International Journal of Computer and Telecommunications Networking
Algebraic Framework for the Specification and Analysis of Cryptographic-Key Distribution
Fundamenta Informaticae
CloudHKA: a cryptographic approach for hierarchical access control in cloud computing
ACNS'13 Proceedings of the 11th international conference on Applied Cryptography and Network Security
Fine-grained access control for cloud computing
International Journal of Grid and Utility Computing
Hi-index | 0.00 |
The need for access control in a hierarchy arises in severaldifferent contexts. One such context is managing the information ofan organization where the users are divided into different securityclasses depending on who has access to what. Several cryptographicsolutions have been proposed to address this problem --- thesolutions are based on generating cryptographic keys for eachsecurity class such that the key for a lower level security classdepends on the key for the security class that is higher up in thehierarchy. Most solutions use complex cryptographic techniques:integrating these into existing systems may not be trivial. Othershave impractical requirement: if a user at a security level wantsto access data at lower levels, then all intermediate nodes must betraversed. Moreover, if there is an access control policy that doesnot conform to the hierarchical structure, such policy cannot behandled by existing solutions. We propose a new solution thatovercomes the above mentioned shortcomings. Our solution not onlyaddresses the problem of access control in a hierarchy but also canbe used for general cases. It is a scheme similar to the RSAcryptosystem and can be easily incorporated in existing systems.