27
Views
9
CrossRef citations to date
0
Altmetric
Original Articles

An asymmetric cryptographuic key assignment scheme for access control in totally-ordered hierarchiesFootnote

Pages 463-468 | Received 04 Jan 1999, Published online: 19 Mar 2007

References

  • Aid , S.G and Taylor , P.D . . Cryptographic solution to a multilevel security problem . Proceedings of Crypto'82 . pp. 237 – 249 .
  • Aid , S.G and Taylor , P.D . 1983 . Cryptographic solution to a problem of access control in a hierarchy . ACM Transactions on Computer Systems , 1
  • Chang , C.C and Wu , T.C . 1992 . Cryptographic key assignment scheme for access control in a hierarchy . Information Systems , 17 : 243 – 247 .
  • Denning , D.E.R . 1982 . Cryptography and data security , Massachusetts : Addison-Wesley .
  • Diffie , W . . The first ten years of public-key cryptography . Proceedings of the IEEE . Vol. 76 , pp. 560 – 577 .
  • Diffie , W and Hellman , M.E . 1976 . New directions in cryptopaphy . IEEE Transactions on Information Theory , 22 : 644 – 654 .
  • Harn , L and Lin , H.Y . 1990 . A cryptographic key generation scheme for multilevel data security . Computers and Security , 9 : 539 – 546 .
  • Hwang , M.S , Chang , C.C and Yang , W.P . 1993 . Modified chang-hwang-wu access control scheme . IEE Electronics tetters , 29 : 2095 – 2096 .
  • Hwang , M.S . 1997 . A cryptographic key assignment scheme in a hierarchy for access control . Mathematical and Computer Modelling , 29 To appear in
  • Maekinnon , S.J , Taylor , P.D , Meijer , H and Akl , S.G . 1985 . An optimal algorithm for assigning cryptographic keys to control access in a hierarchy . IEEE Transactions on Computers , 34 : 797 – 802 .
  • Moore , J.H . . Protocol failures in cryptosystems . Proceedings of IEEE . Vol. 76 , pp. 594 – 602 .
  • Rabin , M.O . 1979 . Digitalized signatures and public-key functions as intractable as factorization , Cambridge, Mass : Massachusetts Institute of Technology . Technical Report MTT/LCS/TR-212,Laboratory for Computer Science
  • Rivest , R.L , Shamir , A and Adleman , L . 1978 . A method for obtaining digital signatures and public key cryptosystems . Communications of the ACM , 21 : 120 – 126 .
  • Sandhu , R.S . 1988 . Cryptographic implementation of a tree hierarchy for access control . Information Processing Letters , 27 : 95 – 98 .
  • Yang , W.P , Hwang , M.S and Lee , C.L . . A cryptographic key assignment scheme for access control in partially-ordered hierarchies . Proceedings of the Third Conference on Information Security . pp. 2.1 – 2.13 .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.