AbstractOften a security system groups users into a hierarchy, with user classes on top having access to objects of user classes below them. Previously proposed cryptographic schemes [1–6] assign a key to each user class. Any user can compute from his key the keys of all user classes who are below him in the hierarchy, thus giving him their access privileges. Moreover, these schemes prevent the possibility of users collaborating to compute a key to which they are not entitled. The major disadvantage of the proposed schemes is that it is not easy to add a new user without having to change most of the previously defined keys. The other major disadvantage is the amount of storage it takes to store the keys.In this paper, we overcome these prob...
[[abstract]]In a traditional key assignment scheme, an access control policy is used to solve the ac...
In many multi-user information systems, the users are organized as a hierarchy. Each user is a subo...
In a hierarchical access control system, users are partitioned into a number of classes—called secur...
AbstractOften a security system groups users into a hierarchy, with user classes on top having acces...
Access control ensures that only the authorized users of a system are allowed to access certain reso...
[[abstract]]The hierarchical cryptographic key assignment is used to assign cryptographic keys to a ...
The problem of key management in an access hierarchy has elicited much interest in the literature. T...
AbstractIn 1993, Chang and Buehrer proposed a cryptographic key assignment scheme based on a one-way...
A hierarchical key assignment scheme is a method to assign some private information and encryption k...
Hierarchical Key Assignment Schemes can be used to enforce access control policies by cryptographic ...
A scheme based on cryptography is proposed for access control in a system where hierarchy is represe...
Abstract-A cryptographic scheme for controlling access to information within a group of users organi...
2014 - 2015Nowadays the current network-centric world has given rise to several security concerns r...
[[abstract]]The access control begins to be widely discussed, especially in organizations and system...
In this paper, we propose a new dynamic cryp-tographic key generation scheme for access control in a...
[[abstract]]In a traditional key assignment scheme, an access control policy is used to solve the ac...
In many multi-user information systems, the users are organized as a hierarchy. Each user is a subo...
In a hierarchical access control system, users are partitioned into a number of classes—called secur...
AbstractOften a security system groups users into a hierarchy, with user classes on top having acces...
Access control ensures that only the authorized users of a system are allowed to access certain reso...
[[abstract]]The hierarchical cryptographic key assignment is used to assign cryptographic keys to a ...
The problem of key management in an access hierarchy has elicited much interest in the literature. T...
AbstractIn 1993, Chang and Buehrer proposed a cryptographic key assignment scheme based on a one-way...
A hierarchical key assignment scheme is a method to assign some private information and encryption k...
Hierarchical Key Assignment Schemes can be used to enforce access control policies by cryptographic ...
A scheme based on cryptography is proposed for access control in a system where hierarchy is represe...
Abstract-A cryptographic scheme for controlling access to information within a group of users organi...
2014 - 2015Nowadays the current network-centric world has given rise to several security concerns r...
[[abstract]]The access control begins to be widely discussed, especially in organizations and system...
In this paper, we propose a new dynamic cryp-tographic key generation scheme for access control in a...
[[abstract]]In a traditional key assignment scheme, an access control policy is used to solve the ac...
In many multi-user information systems, the users are organized as a hierarchy. Each user is a subo...
In a hierarchical access control system, users are partitioned into a number of classes—called secur...