On some cryptographic solutions for access control in a tree hierarchy
ACM '87 Proceedings of the 1987 Fall Joint Computer Conference on Exploring technology: today and tomorrow
Flexible access control with master keys
CRYPTO '89 Proceedings on Advances in cryptology
A cryptographic solution to implement access control in a hierarchy and more
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
A Time-Bound Cryptographic Key Assignment Scheme for Access Control in a Hierarchy
IEEE Transactions on Knowledge and Data Engineering
A new dynamic key generation scheme for access control in a hierarchy
Nordic Journal of Computing
Chinese Remainder Theorem Based Hierarchical Access Control for Secure Group Communication
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
A new key assignment scheme for enforcing complicated access control policies in hierarchy
Future Generation Computer Systems - Selected papers from CCGRID 2002
Key assignment for enforcing access control policy exceptions in distributed systems
Information Sciences: an International Journal
Controlling access in large partially ordered hierarchies using cryptographic keys
Journal of Systems and Software
Efficient Time-Bound Hierarchical Key Assignment Scheme
IEEE Transactions on Knowledge and Data Engineering
A Novel Key Management Scheme for Dynamic Access Control in a User Hierarchy
COMPSAC '04 Proceedings of the 28th Annual International Computer Software and Applications Conference - Volume 01
Cryptographic key assignment schemes for any access control policy
Information Processing Letters
Hierarchical key management scheme using polynomial interpolation
ACM SIGOPS Operating Systems Review
Modifying YCN key assignment scheme to resist the attack from Hwang
Information Processing Letters
An RSA-based time-bound hierarchical key assignment scheme for electronic article subscription
Proceedings of the 14th ACM international conference on Information and knowledge management
Dynamic and efficient key management for access hierarchies
Proceedings of the 12th ACM conference on Computer and communications security
Key management for multi-user encrypted databases
Proceedings of the 2005 ACM workshop on Storage security and survivability
Key management for non-tree access hierarchies
Proceedings of the eleventh ACM symposium on Access control models and technologies
Unconditionally secure key assignment schemes
Discrete Applied Mathematics - Special issue: Coding and cryptography
Provably-secure time-bound hierarchical key assignment schemes
Proceedings of the 13th ACM conference on Computer and communications security
Selective Data Encryption in Outsourced Dynamic Environments
Electronic Notes in Theoretical Computer Science (ENTCS)
Tolerant Key Assignment for Enforcing Complicated Access Control Policies in a Hierarchy
Fundamenta Informaticae
Key management for content access control in a hierarchy
Computer Networks: The International Journal of Computer and Telecommunications Networking
A secure time-bound hierarchical key assignment scheme based on RSA public key cryptosystem
Information Processing Letters
A dynamic key management solution to access hierarchy
International Journal of Network Management
On replacing cryptographic keys in hierarchical key management systems
Journal of Computer Security - The Third IEEE International Symposium on Security in Networks and Distributed Systems
New constructions for provably-secure time-bound hierarchical key assignment schemes
Theoretical Computer Science
Patient controlled encryption: ensuring privacy of electronic medical records
Proceedings of the 2009 ACM workshop on Cloud computing security
Enforcing non-hierarchical access policies by hierarchical key assignment schemes
Information Processing Letters
Unconditionally secure key assignment schemes
Discrete Applied Mathematics - Special issue: Coding and cryptography
Modifying YCN key assignment scheme to resist the attack from Hwang
Information Processing Letters
Cryptographic key assignment schemes for any access control policy
Information Processing Letters
Encryption policies for regulating access to outsourced data
ACM Transactions on Database Systems (TODS)
Data privacy - problems and solutions
ICISS'07 Proceedings of the 3rd international conference on Information systems security
An efficient key assignment scheme for access control in a large leaf class hierarchy
Information Sciences: an International Journal
Efficient and scalable hierarchical key assignment scheme
ACOS'06 Proceedings of the 5th WSEAS international conference on Applied computer science
Enforcement of non-hierarchical access policies
ICCOM'06 Proceedings of the 10th WSEAS international conference on Communications
Efficient key assignment for hierarchical access control using one-way hash function
ICCOMP'06 Proceedings of the 10th WSEAS international conference on Computers
A mutual and pseudo inverse matrix - based authentication mechanism for outsourcing service
ACIIDS'11 Proceedings of the Third international conference on Intelligent information and database systems - Volume Part I
Efficient provably-secure hierarchical key assignment schemes
Theoretical Computer Science
Applying time-bound hierarchical key assignment in wireless sensor networks
ICICS'11 Proceedings of the 13th international conference on Information and communications security
A new key assignment scheme for access control in a complete tree hierarchy
WCC'05 Proceedings of the 2005 international conference on Coding and Cryptography
Metadata management in outsourced encrypted databases
SDM'05 Proceedings of the Second VDLB international conference on Secure Data Management
A cryptographic solution for general access control
ISC'05 Proceedings of the 8th international conference on Information Security
Enforcing the security of a time-bound hierarchical key assignment scheme
Information Sciences: an International Journal
An efficient key assignment scheme for access control in a hierarchy
ICISS'06 Proceedings of the Second international conference on Information Systems Security
An access control scheme for partially ordered set hierarchy with provable security
SAC'05 Proceedings of the 12th international conference on Selected Areas in Cryptography
Peeling away layers of an RFID security system
FC'11 Proceedings of the 15th international conference on Financial Cryptography and Data Security
An efficient key management scheme for content access control for linear hierarchies
Computer Networks: The International Journal of Computer and Telecommunications Networking
Research: Dynamic key management schemes for access control in a hierarchy
Computer Communications
A cryptographic key assignment scheme in a hierarchy for access control
Mathematical and Computer Modelling: An International Journal
Research note: Comments on `dynamic key management schemes for access control in a hierarchy'
Computer Communications
A Novel Cryptographic Key Assignment Scheme with ID-Based Access Control in a Hierachy
Fundamenta Informaticae
Tolerant Key Assignment for Enforcing Complicated Access Control Policies in a Hierarchy
Fundamenta Informaticae
A secure effective key management scheme for dynamic access control in a large leaf class hierarchy
Information Sciences: an International Journal
Hi-index | 0.90 |