In group communication, users often have different access rights to multiple data streams. Based on the access relation of users and data streams, users can form partially ordered relation, and data streams can form partially ordered relation. In this paper, we propose a key management scheme for hierarchical access control, which considers both partially ordered user relations and partially ordered data stream relations. We also propose an algorithm for constructing a logical key graph, which is suitable even when users and data streams have complex relations. Simulation results show that our scheme can significantl
[[abstract]]In recent years, the ubiquity of communication networks speed up the development of wire...
[[abstract]]The employees of an organization are usually divided into different security classes to ...
Access control is an indispensable security component of cloud computing, and hierarchical access co...
Without proposing a new key assignment scheme, this paper presents a graph translation procedure so ...
[[abstract]]The access control begins to be widely discussed, especially in organizations and system...
The problem of key management in an access hierarchy has elicited much interest in the literature. T...
AbstractIn this paper, a dynamic user hierarchy mechanism based on key pairs is proposed. Through ca...
Abstract: A common property of practically all multi-party key agreement protocols is that they are ...
Access control ensures that only the authorized users of a system are allowed to access certain reso...
In a hierarchical access control system, users are partitioned into a number of classes—called secur...
Abstract. All organizations share data in a carefully managed fashion by using access control mechan...
Abstract-A cryptographic scheme for controlling access to information within a group of users organi...
All organizations share data in a carefully managed fashion by using access control mechanisms. We f...
In electronic subscription and pay TV systems, data can be organized and encrypted using symmetric k...
A scheme based on cryptography is proposed for access control in a system where hierarchy is represe...
[[abstract]]In recent years, the ubiquity of communication networks speed up the development of wire...
[[abstract]]The employees of an organization are usually divided into different security classes to ...
Access control is an indispensable security component of cloud computing, and hierarchical access co...
Without proposing a new key assignment scheme, this paper presents a graph translation procedure so ...
[[abstract]]The access control begins to be widely discussed, especially in organizations and system...
The problem of key management in an access hierarchy has elicited much interest in the literature. T...
AbstractIn this paper, a dynamic user hierarchy mechanism based on key pairs is proposed. Through ca...
Abstract: A common property of practically all multi-party key agreement protocols is that they are ...
Access control ensures that only the authorized users of a system are allowed to access certain reso...
In a hierarchical access control system, users are partitioned into a number of classes—called secur...
Abstract. All organizations share data in a carefully managed fashion by using access control mechan...
Abstract-A cryptographic scheme for controlling access to information within a group of users organi...
All organizations share data in a carefully managed fashion by using access control mechanisms. We f...
In electronic subscription and pay TV systems, data can be organized and encrypted using symmetric k...
A scheme based on cryptography is proposed for access control in a system where hierarchy is represe...
[[abstract]]In recent years, the ubiquity of communication networks speed up the development of wire...
[[abstract]]The employees of an organization are usually divided into different security classes to ...
Access control is an indispensable security component of cloud computing, and hierarchical access co...