On some cryptographic solutions for access control in a tree hierarchy
ACM '87 Proceedings of the 1987 Fall Joint Computer Conference on Exploring technology: today and tomorrow
Flexible access control with master keys
CRYPTO '89 Proceedings on Advances in cryptology
Key management for content access control in a hierarchy
Computer Networks: The International Journal of Computer and Telecommunications Networking
New key management systems for multilevel security
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II
Hi-index | 0.00 |
This paper addresses one aspect ofthe problem of access control in a hierarchy.A general scheme is describedwhich allows a user to generate from hisown key the keys of users below him inthe hierarchy. Two implementations ofthis scheme are then proposed andcompared in terms of security andefficiency to an existing one.