Abstract. All organizations share data in a carefully managed fashion by using access control mechanisms. We focus on enforcing access con-trol by encrypting the data and managing the encryption keys. We make the realistic assumption that the structure of any organization is a hi-erarchy of security classes. Data from a certain security class can only be accessed by another security class, if it is higher or at the same level in the hierarchy. Otherwise access is denied. Our solution is based on the Die-Hellman key exchange protocol. We show, that the theoretical worst case performance of our solution is slightly better than that of all other existing solutions. We also show, that our performance in practical cases is linear in the size of ...
Abstract-A cryptographic scheme for controlling access to information within a group of users organi...
A formal definition and analysis on the hierarchical key management is presented for permission mana...
Abstract Key management is an essential component of a cryptographic access control system with a la...
All organizations share data in a carefully managed fashion by using access control mechanisms. We f...
A scheme based on cryptography is proposed for access control in a system where hierarchy is represe...
Abstract. Access control is a fundamental concern in any sys-tem that manages resources, e.g., opera...
Access control ensures that only the authorized users of a system are allowed to access certain reso...
Access control is a fundamental concern in any system that manages resources, e.g., operating system...
In a hierarchical access control system, users are partitioned into a number of classes—called secur...
AbstractOften a security system groups users into a hierarchy, with user classes on top having acces...
[[abstract]]In a traditional key assignment scheme, an access control policy is used to solve the ac...
The concept of hierarchical access control is that a higher privileged user (or higher level) has th...
Enforcing access control in an organization has been an important research area in computer security...
The problem of key management in an access hierarchy has elicited much interest in the literature. T...
Hierarchical access control (HAC) has been a fundamental problem in computer and network systems. Si...
Abstract-A cryptographic scheme for controlling access to information within a group of users organi...
A formal definition and analysis on the hierarchical key management is presented for permission mana...
Abstract Key management is an essential component of a cryptographic access control system with a la...
All organizations share data in a carefully managed fashion by using access control mechanisms. We f...
A scheme based on cryptography is proposed for access control in a system where hierarchy is represe...
Abstract. Access control is a fundamental concern in any sys-tem that manages resources, e.g., opera...
Access control ensures that only the authorized users of a system are allowed to access certain reso...
Access control is a fundamental concern in any system that manages resources, e.g., operating system...
In a hierarchical access control system, users are partitioned into a number of classes—called secur...
AbstractOften a security system groups users into a hierarchy, with user classes on top having acces...
[[abstract]]In a traditional key assignment scheme, an access control policy is used to solve the ac...
The concept of hierarchical access control is that a higher privileged user (or higher level) has th...
Enforcing access control in an organization has been an important research area in computer security...
The problem of key management in an access hierarchy has elicited much interest in the literature. T...
Hierarchical access control (HAC) has been a fundamental problem in computer and network systems. Si...
Abstract-A cryptographic scheme for controlling access to information within a group of users organi...
A formal definition and analysis on the hierarchical key management is presented for permission mana...
Abstract Key management is an essential component of a cryptographic access control system with a la...