Enforcing access control in an organization has been an important research area in computer security for many years. Generally an organization has a hierarchical structure. The system resources and information are classified into different classes with different security clearances. A hierarchical access control policy allows higher security classes to access lower security classes, but not the opposite. Over the last twenty years, many solutions have been proposed, which are mainly based on generating cryptographic keys for each security class such that the key for a lower level security class can be derived from the key for a security class that is higher in the hierarchy. Besides the strict hierarchical organizations, there exist other t...
In this paper, we propose a new dynamic cryp-tographic key generation scheme for access control in a...
Abstract. All organizations share data in a carefully managed fashion by using access control mechan...
A time-bound hierarchical key assignment scheme is a method to assign a cryptographic key to each c...
Enforcing access control in an organization has been an important research area in computer security...
[[abstract]]In a traditional key assignment scheme, an access control policy is used to solve the ac...
[[abstract]]The access control begins to be widely discussed, especially in organizations and system...
Without proposing a new key assignment scheme, this paper presents a graph translation procedure so ...
A hierarchical key assignment scheme is a method to assign some private information and encryption k...
[[abstract]]The hierarchical cryptographic key assignment is used to assign cryptographic keys to a ...
Abstract-A cryptographic scheme for controlling access to information within a group of users organi...
All organizations share data in a carefully managed fashion by using access control mechanisms. We f...
Access control ensures that only the authorized users of a system are allowed to access certain reso...
In a hierarchical access control system, users are partitioned into a number of classes—called secur...
Abstract:- The access privileges in distributed systems are often organized as a hierarchy structure...
AbstractOften a security system groups users into a hierarchy, with user classes on top having acces...
In this paper, we propose a new dynamic cryp-tographic key generation scheme for access control in a...
Abstract. All organizations share data in a carefully managed fashion by using access control mechan...
A time-bound hierarchical key assignment scheme is a method to assign a cryptographic key to each c...
Enforcing access control in an organization has been an important research area in computer security...
[[abstract]]In a traditional key assignment scheme, an access control policy is used to solve the ac...
[[abstract]]The access control begins to be widely discussed, especially in organizations and system...
Without proposing a new key assignment scheme, this paper presents a graph translation procedure so ...
A hierarchical key assignment scheme is a method to assign some private information and encryption k...
[[abstract]]The hierarchical cryptographic key assignment is used to assign cryptographic keys to a ...
Abstract-A cryptographic scheme for controlling access to information within a group of users organi...
All organizations share data in a carefully managed fashion by using access control mechanisms. We f...
Access control ensures that only the authorized users of a system are allowed to access certain reso...
In a hierarchical access control system, users are partitioned into a number of classes—called secur...
Abstract:- The access privileges in distributed systems are often organized as a hierarchy structure...
AbstractOften a security system groups users into a hierarchy, with user classes on top having acces...
In this paper, we propose a new dynamic cryp-tographic key generation scheme for access control in a...
Abstract. All organizations share data in a carefully managed fashion by using access control mechan...
A time-bound hierarchical key assignment scheme is a method to assign a cryptographic key to each c...