Dynamic and efficient key management for access hierarchies
- 7 November 2005
- conference paper
- conference paper
- Published by Association for Computing Machinery (ACM)
Abstract
No abstract availableThis publication has 36 references indexed in Scilit:
- Cryptographic key assignment schemes for any access control policyInformation Processing Letters, 2004
- A new cryptographic key assignment scheme with time-constraint access control in a hierarchyComputer Standards & Interfaces, 2004
- New hierarchical assignment without Public Key cryptographyComputers & Security, 2003
- Controlling access in large partially ordered hierarchies using cryptographic keysJournal of Systems and Software, 2003
- A practical key management scheme for access control in a user hierarchyComputers & Security, 2002
- Hierarchical access control based on Chinese Remainder Theorem and symmetric algorithmComputers & Security, 2002
- A time-bound cryptographic key assignment scheme for access control in a hierarchyIEEE Transactions on Knowledge and Data Engineering, 2002
- A cryptographic implementation for dynamic access control in a user hierarchyComputers & Security, 1995
- A cryptographic key generation scheme for multilevel data securityComputers & Security, 1990
- Cryptographic implementation of a tree hierarchy for access controlInformation Processing Letters, 1988