An Optimal Algorithm for Assigning Cryptographic Keys to Control Access in a Hierarchy
IEEE Transactions on Computers
Cryptographic implementation of a tree hierarchy for access control
Information Processing Letters
A cryptographic key generation scheme for multilevel data security
Computers and Security
Multilevel security in the UNIX tradition
Software—Practice & Experience
Cryptographic key assignment scheme for access control in a hierarchy
Information Systems
Cryptanalysis of YCN key assignment scheme in a hierarchy
Information Processing Letters
Cryptographic solution to a problem of access control in a hierarchy
ACM Transactions on Computer Systems (TOCS)
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
A cryptographic key assignment scheme in a hierarchy for access control
Mathematical and Computer Modelling: An International Journal
Cryptographic key assignment schemes for any access control policy
Information Processing Letters
Cryptanalysis of Hwang-Yang scheme for controlling access in large partially ordered hierarchies
Journal of Systems and Software - Special issue: Software engineering education and training
Dynamic and efficient key management for access hierarchies
Proceedings of the 12th ACM conference on Computer and communications security
Key management for multi-user encrypted databases
Proceedings of the 2005 ACM workshop on Storage security and survivability
Key management for non-tree access hierarchies
Proceedings of the eleventh ACM symposium on Access control models and technologies
Unconditionally secure key assignment schemes
Discrete Applied Mathematics - Special issue: Coding and cryptography
Access control in user hierarchy based on elliptic curve cryptosystem
Information Sciences: an International Journal
Efficient key management for cryptographically enforced access control
Computer Standards & Interfaces
Dynamic and Efficient Key Management for Access Hierarchies
ACM Transactions on Information and System Security (TISSEC)
Unconditionally secure key assignment schemes
Discrete Applied Mathematics - Special issue: Coding and cryptography
Cryptographic key assignment schemes for any access control policy
Information Processing Letters
Encryption policies for regulating access to outsourced data
ACM Transactions on Database Systems (TODS)
Data privacy - problems and solutions
ICISS'07 Proceedings of the 3rd international conference on Information systems security
Efficient utilization of elliptic curve cryptosystem for hierarchical access control
Journal of Systems and Software
An efficient key assignment scheme for access control in a large leaf class hierarchy
Information Sciences: an International Journal
Secure key management scheme for dynamic hierarchical access control based on ECC
Journal of Systems and Software
Metadata management in outsourced encrypted databases
SDM'05 Proceedings of the Second VDLB international conference on Secure Data Management
International Journal of Communication Networks and Distributed Systems
A secure effective key management scheme for dynamic access control in a large leaf class hierarchy
Information Sciences: an International Journal
Hi-index | 0.00 |
The problem of access control in a hierarchy is present in many application areas. Since computing resources have grown tremendously, access control is more frequently required in areas such as computer networks, database management systems, and operating systems. Many schemes based on cryptography have been proposed to solve this problem. However, previous schemes need large values associated with each security class. In this paper, we propose a new scheme to solve this problem achieving the following two goals. One is that the number of keys is reduced without affecting the security of the system. The other goal is that when a security class is added to the system, we need only update a few keys of the related security classes with simple operations.