An Optimal Algorithm for Assigning Cryptographic Keys to Control Access in a Hierarchy
IEEE Transactions on Computers
Cryptographic implementation of a tree hierarchy for access control
Information Processing Letters
A cryptographic key generation scheme for multilevel data security
Computers and Security
Cryptographic key assignment scheme for access control in a hierarchy
Information Systems
A database encryption system with subkeys
ACM Transactions on Database Systems (TODS)
Cryptographic solution to a problem of access control in a hierarchy
ACM Transactions on Computer Systems (TOCS)
Flexible Access Control with Master Keys
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
Research: Dynamic key management schemes for access control in a hierarchy
Computer Communications
Dynamic and efficient key management for access hierarchies
Proceedings of the 12th ACM conference on Computer and communications security
Key management for non-tree access hierarchies
Proceedings of the eleventh ACM symposium on Access control models and technologies
Efficient techniques for realizing geo-spatial access control
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
A dynamic key management solution to access hierarchy
International Journal of Network Management
Dynamic and Efficient Key Management for Access Hierarchies
ACM Transactions on Information and System Security (TISSEC)
Secure and efficient access to outsourced data
Proceedings of the 2009 ACM workshop on Cloud computing security
Design of a lattice-based access control scheme
SMC'09 Proceedings of the 2009 IEEE international conference on Systems, Man and Cybernetics
A Study on Agent-Based Secure Scheme for Electronic Medical Record System
Journal of Medical Systems
Hi-index | 0.00 |
Considering the solution of dynamic access problems in a user hierarchy, a novel scheme based on one-way hash function is proposed to manage the cryptographic keys in the paper. The scheme attempts to achieve both efficiency and non-iteration in deriving the successorýs secret key. Besides, the other issues in relation with dynamic access control problems, such as adding/deleting classes, adding/deleting relationships and changing secret keys, can be held good to the scheme. In view of security, a competent Central Authority must provide the user a convenient way to change his/her key at any time; therefore, the design toward the algorithm in the paper contains such a function. What weight to mention especially among these characteristics of the scheme is the simplification of procedure in changing the private key, and no other current keys need altering simultaneously.