Hierarchical access control (HAC) has been a fundamental problem in computer and network systems. Since Akl and Taylor proposed the first HAC scheme based on number theory in 1983, cryptographic key management techniques for HAC have appeared as a new and promising class of solutions to the HAC problem. Many cryptographic HAC schemes have been proposed in the past two decades. One common feature associated with these schemes is that they basically limited dynamic operations at the node level. In this paper, by introducing the innovative concept of ‘access polynomial’ and representing a key value as the sum of two polynomials in a finite field, we propose a new key management scheme for dynamic access hierarchy. The newly proposed scheme sup...
2014 - 2015Nowadays the current network-centric world has given rise to several security concerns r...
The concept of hierarchical access control is that a higher privileged user (or higher level) has th...
[[abstract]]In a traditional key assignment scheme, an access control policy is used to solve the ac...
The problem of key management in an access hierarchy has elicited much interest in the literature. T...
A hierarchical key assignment scheme is a method to assign some private information and encryption k...
[[abstract]]The access control begins to be widely discussed, especially in organizations and system...
The special needs for cryptography, of both wired and wireless networks, have attracted the research...
Access control is an indispensable security component of cloud computing, and hierarchical access co...
A formal definition and analysis on the hierarchical key management is presented for permission mana...
A scheme based on cryptography is proposed for access control in a system where hierarchy is represe...
Abstract. All organizations share data in a carefully managed fashion by using access control mechan...
All organizations share data in a carefully managed fashion by using access control mechanisms. We f...
[[abstract]]Lin [1] proposed a dynamic key management scheme suitable for hierarchical control syste...
Access control ensures that only the authorized users of a system are allowed to access certain reso...
In this paper, we propose a new dynamic cryp-tographic key generation scheme for access control in a...
2014 - 2015Nowadays the current network-centric world has given rise to several security concerns r...
The concept of hierarchical access control is that a higher privileged user (or higher level) has th...
[[abstract]]In a traditional key assignment scheme, an access control policy is used to solve the ac...
The problem of key management in an access hierarchy has elicited much interest in the literature. T...
A hierarchical key assignment scheme is a method to assign some private information and encryption k...
[[abstract]]The access control begins to be widely discussed, especially in organizations and system...
The special needs for cryptography, of both wired and wireless networks, have attracted the research...
Access control is an indispensable security component of cloud computing, and hierarchical access co...
A formal definition and analysis on the hierarchical key management is presented for permission mana...
A scheme based on cryptography is proposed for access control in a system where hierarchy is represe...
Abstract. All organizations share data in a carefully managed fashion by using access control mechan...
All organizations share data in a carefully managed fashion by using access control mechanisms. We f...
[[abstract]]Lin [1] proposed a dynamic key management scheme suitable for hierarchical control syste...
Access control ensures that only the authorized users of a system are allowed to access certain reso...
In this paper, we propose a new dynamic cryp-tographic key generation scheme for access control in a...
2014 - 2015Nowadays the current network-centric world has given rise to several security concerns r...
The concept of hierarchical access control is that a higher privileged user (or higher level) has th...
[[abstract]]In a traditional key assignment scheme, an access control policy is used to solve the ac...