An Efficient Time-Bound Access Control Scheme for Dynamic Access Hierarchy
暂无分享,去创建一个
Kai Wang | Xukai Zou | Yan Sui | Fabio Maino | Yudong Guo
[1] Hung-Yu Chen,et al. Efficient time-bound hierarchical key assignment scheme , 2004 .
[2] Elisa Bertino,et al. A Practical and Flexible Key Management Mechanism For Trusted Collaborative Computing , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[3] Selim G. Akl,et al. An Optimal Algorithm for Assigning Cryptographic Keys to Control Access in a Hierarchy , 1985, IEEE Transactions on Computers.
[4] Wen-Guey Tzeng,et al. A Time-Bound Cryptographic Key Assignment Scheme for Access Control in a Hierarchy , 2002, IEEE Trans. Knowl. Data Eng..
[5] Stafford E. Tavares,et al. Flexible Access Control with Master Keys , 1989, CRYPTO.
[6] Selim G. Akl,et al. Cryptographic solution to a problem of access control in a hierarchy , 1983, TOCS.
[7] Sheng Zhong,et al. A practical key management scheme for access control in a user hierarchy , 2002, Comput. Secur..
[8] Ashutosh Saxena,et al. Hierarchical key management scheme using polynomial interpolation , 2005, OPSR.
[9] Indrajit Ray,et al. A cryptographic solution to implement access control in a hierarchy and more , 2002, SACMAT '02.
[10] Sung-Ming Yen,et al. Fast algorithms for LUC digital signature computation , 1995 .
[11] Chu-Hsing Lin,et al. Dynamic key management schemes for access control in a hierarchy , 1997, Comput. Commun..
[12] Hung-Yu Chien,et al. Efficient time-bound hierarchical key assignment scheme , 2004, IEEE Transactions on Knowledge and Data Engineering.
[13] Yu-Fang Chung,et al. A novel key management scheme for dynamic access control in a user hierarchy , 2004, Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004..
[14] Xun Yi,et al. Security of Chien's efficient time-bound hierarchical key assignment scheme , 2005, IEEE Transactions on Knowledge and Data Engineering.
[15] Victor R. L. Shen,et al. A Novel Key Management Scheme Based on Discrete Logarithms and Polynomial Interpolations , 2002, Comput. Secur..
[16] Lein Harn,et al. A cryptographic key generation scheme for multilevel data security , 1990, Comput. Secur..
[17] Elisa Bertino,et al. An Efficient Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting , 2008, IEEE Transactions on Dependable and Secure Computing.
[18] Yiming Ye,et al. Security of Tzeng's Time-Bound Key Assignment Scheme for Access Control in a Hierarchy , 2003, IEEE Trans. Knowl. Data Eng..
[19] Marina Blanton,et al. Dynamic and Efficient Key Management for Access Hierarchies , 2009, TSEC.
[20] Byrav Ramamurthy,et al. Chinese Remainder Theorem Based Hierarchical Access Control for Secure Group Communication , 2001, ICICS.
[21] Ravi S. Sandhu,et al. Cryptographic Implementation of a Tree Hierarchy for Access Control , 1988, Inf. Process. Lett..
[22] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .