An Optimal Algorithm for Assigning Cryptographic Keys to Control Access in a Hierarchy
IEEE Transactions on Computers
Cryptographic implementation of a tree hierarchy for access control
Information Processing Letters
A cryptographic key generation scheme for multilevel data security
Computers and Security
Cryptographic key assignment scheme for access control in a hierarchy
Information Systems
Hierarchy representations based on arithmetic coding for dynamic information protection systems
Information Sciences: an International Journal
A two-phase encryption scheme for enhancing database security
Journal of Systems and Software
The art of computer programming, volume 2 (3rd ed.): seminumerical algorithms
The art of computer programming, volume 2 (3rd ed.): seminumerical algorithms
Cryptographic solution to a problem of access control in a hierarchy
ACM Transactions on Computer Systems (TOCS)
Cryptography and data security
Cryptography and data security
A cryptographic key assignment scheme in a hierarchy for access control
Mathematical and Computer Modelling: An International Journal
A new key assignment scheme for enforcing complicated access control policies in hierarchy
Future Generation Computer Systems - Selected papers from CCGRID 2002
Dynamic and efficient key management for access hierarchies
Proceedings of the 12th ACM conference on Computer and communications security
Tolerant Key Assignment for Enforcing Complicated Access Control Policies in a Hierarchy
Fundamenta Informaticae
Dynamic and Efficient Key Management for Access Hierarchies
ACM Transactions on Information and System Security (TISSEC)
Efficient migration access control for mobile agents
Computer Standards & Interfaces
An efficient key assignment scheme for access control in a large leaf class hierarchy
Information Sciences: an International Journal
Tolerant Key Assignment for Enforcing Complicated Access Control Policies in a Hierarchy
Fundamenta Informaticae
Cryptanalysis of the Hwang-Shi Proxy Signature Scheme
Fundamenta Informaticae
SecureDropbox: a file encryption system suitable for cloud storage services
Proceedings of the 2013 ACM Cloud and Autonomic Computing Conference
Hi-index | 0.00 |
In this paper, we propose a new dynamic cryptographic key generation scheme for access control in a hierarchy. Our method can achieve the following three goals. First, the storage space needed to store public information is smaller than that required in previous work. Second, when a security class is added to the hierarchy, we assign a secret key and a public derivation key to the security class without affecting the keys of the other security classes in the hierarchy. Third, when a security class is deleted from the hierarchy, we simply erase the keys of that security class in the hierarchy and change the derivation key of its immediate ancestor.