An Optimal Algorithm for Assigning Cryptographic Keys to Control Access in a Hierarchy
IEEE Transactions on Computers
Cryptographic implementation of a tree hierarchy for access control
Information Processing Letters
A cryptographic key generation scheme for multilevel data security
Computers and Security
Dynamic access control scheme based on the Chinese remainder theorem
Computer Systems Science and Engineering
Distributed assignment of cryptographic keys for access control in a hierarchy
Computers and Security
Cryptographic solution to a problem of access control in a hierarchy
ACM Transactions on Computer Systems (TOCS)
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Protection in operating systems
Communications of the ACM
DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION
DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION
A novel key agreement protocol based on chaotic maps
Information Sciences: an International Journal
Managing user relationships in hierarchies for information system security
Decision Support Systems
Access control in user hierarchy based on elliptic curve cryptosystem
Information Sciences: an International Journal
A dynamic mechanism for determining relationships in a partially ordered user hierarchy
International Journal of High Performance Computing and Networking
An efficient key assignment scheme for access control in a large leaf class hierarchy
Information Sciences: an International Journal
Information Sciences: an International Journal
Hi-index | 0.07 |
A cryptographic key assignment scheme is proposed to enforce access control policies in which antisymmetric and transitive exceptions are included, in addition to the policies with partial ordered set (POSet) properties. In current literature, all proposed cryptographic key assignment schemes assume a user hierarchy model which can only enforce policies with POSet properties. The POSet properties are suitable for hierarchical systems. However, there are many systems, especially distributed systems handling indirect remote accesses, that cannot be modeled as a strict hierarchy. A new access control model named user hierarchy-with-exception and its enforcing key assignment scheme are proposed for those systems.There is only one key assigned to each user class in enforcing the user hierarchy model. The cost to achieve our more powerful scheme in the user hierarchy-with-exception model is one more key for each user class to memorize or one more step to access its own data.