AbstractIn this paper, a dynamic user hierarchy mechanism based on key pairs is proposed. Through careful design of keys, we get an economic integer key pair for each user. In our scheme, the relationship between two users can be easily revealed by performing a simple formula to the key pair. Furthermore, by applying our scheme, whenever a new user is inserted into the user hierarchy system, the corresponding key pair can be determined quickly without changing any existing key pairs
A formal definition and analysis on the hierarchical key management is presented for permission mana...
A scheme based on cryptography is proposed for access control in a system where hierarchy is represe...
[[abstract]]The access control begins to be widely discussed, especially in organizations and system...
AbstractIn this paper, a dynamic user hierarchy mechanism based on key pairs is proposed. Through ca...
AbstractIn this paper, a dynamic user hierarchy mechanism based on arithmetic coding is proposed. Th...
In group communication, users often have different access rights to multiple data streams. Based on ...
The problem of key management in an access hierarchy has elicited much interest in the literature. T...
AbstractOften a security system groups users into a hierarchy, with user classes on top having acces...
[[abstract]]User hierarchy is a critical issue in the access control policy for information protecti...
[[abstract]]In recent years, the ubiquity of communication networks speed up the development of wire...
Access control ensures that only the authorized users of a system are allowed to access certain reso...
Abstract:- The access privileges in distributed systems are often organized as a hierarchy structure...
Abstract-A cryptographic scheme for controlling access to information within a group of users organi...
Hierarchical access control (HAC) has been a fundamental problem in computer and network systems. Si...
A hierarchical key assignment scheme is a method to assign some private information and encryption k...
A formal definition and analysis on the hierarchical key management is presented for permission mana...
A scheme based on cryptography is proposed for access control in a system where hierarchy is represe...
[[abstract]]The access control begins to be widely discussed, especially in organizations and system...
AbstractIn this paper, a dynamic user hierarchy mechanism based on key pairs is proposed. Through ca...
AbstractIn this paper, a dynamic user hierarchy mechanism based on arithmetic coding is proposed. Th...
In group communication, users often have different access rights to multiple data streams. Based on ...
The problem of key management in an access hierarchy has elicited much interest in the literature. T...
AbstractOften a security system groups users into a hierarchy, with user classes on top having acces...
[[abstract]]User hierarchy is a critical issue in the access control policy for information protecti...
[[abstract]]In recent years, the ubiquity of communication networks speed up the development of wire...
Access control ensures that only the authorized users of a system are allowed to access certain reso...
Abstract:- The access privileges in distributed systems are often organized as a hierarchy structure...
Abstract-A cryptographic scheme for controlling access to information within a group of users organi...
Hierarchical access control (HAC) has been a fundamental problem in computer and network systems. Si...
A hierarchical key assignment scheme is a method to assign some private information and encryption k...
A formal definition and analysis on the hierarchical key management is presented for permission mana...
A scheme based on cryptography is proposed for access control in a system where hierarchy is represe...
[[abstract]]The access control begins to be widely discussed, especially in organizations and system...