Ten serwis zostanie wyłączony 2025-02-11.
Nowa wersja platformy, zawierająca wyłącznie zasoby pełnotekstowe, jest już dostępna.
Przejdź na https://bibliotekanauki.pl

PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
2007 | Vol. 76, nr 1-2 | 13-23
Tytuł artykułu

Tolerant Key Assignment for Enforcing Complicated Access Control Policies in a Hierarchy

Wybrane pełne teksty z tego czasopisma
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
In 1998, Yeh et al. proposed a flexible key assignment scheme for enforcing complicated access control policies in a user matrix model. Later, Hwang indicated that Yeh et al.' scheme is susceptible to some security flaws. Thus, Lin et al. proposed a key assignment scheme for enforcing complicated access control policies in a hierarchy. However, there exist drawbacks in Lin et al.'s scheme: lack of efficiency and a large variation of the keys. Hence, we propose an efficient key assignment scheme in a hierarchy for enforcing the complicated access control policies. What is more, the secret key of one class is allowed to be changed several times without influencing the derivation key in our proposed scheme.
Słowa kluczowe
Wydawca

Rocznik
Strony
13-23
Opis fizyczny
bibliogr. 18 poz., tab.
Twórcy
autor
autor
  • Department of Computer Science and Information Engineering, National Chung Cheng Uniersity, Chiayi, Taiwan, 621, R.O.C., cyf@cs.ccu.edu.tw
Bibliografia
  • [1] H.-Y. Chien and J.-K. Jan,"New Hierarchical Assignment without Public Key Cryptography," Computers &Security, Vol. 22, No. 6, 2003, pp. 523-526.
  • [2] I.-C. Lin,M.-S. Hwang, and C.-C. Chang,"A New Key Assignment Scheme for Enforcing Complicated Access Control Policies in Hierarchy," Future Generation Computer Systems, Vol. 19, N0. 4, May 2003, pp. 457-462.
  • [3] D. E. Denning, S. G. Akl, M. Morgenstern, and P. G. Nermann, "View for Multilevel Database Security," Proceedings of IEEE Symposium on Security and Privacy, Oakland, C.A., April 1986, pp. 156-172.
  • [4] D. E. Denning, "Cryptographic Checksums for Multilevel Database Security," Proceedings of IEEE Symposium on Security and Privacy, Oakland, C.A., April 1984, pp. 52-61.
  • [5] G. I. Davida, D. L. Wells, and J. B. Kam, "A Database Encryption System with Subkeys," ACM Transactions on Database Systems, Vol. 6, No. 2, 1981, pp. 312-328.
  • [6] S. G. Akl and P. D. Taylor, "Cryptographic Solution to a Problem of Access Control in a Hierarchy," ACM Transactions on Computer Systems, Vol. 1, No. 3, August 1983, pp. 239-248.
  • [7] C.-C. Chang, R.-J. Hwang, and T.-C. Wu, "Cryptographic Key Assignment Scheme for Access Control in a Hierarchy," Information Systems, Vol. 17, No. 3, May 1992, pp. 23-247.
  • [8] L. Harn and H.-Y. Lin, "A Cryptographic Key Assignment Scheme for Multilevel Data Security," Computers & Security, Vol. 9, October 1990, pp. 539-546.
  • [9] M.-S. Hwang, "A Cryptographic Key Assignment Scheme in a Hierarchy for Access Control," Mathematical and Computer Modeling, Vol. 26, No. 2, June 1997, pp. 27-31.
  • [10] M.-S. Hwang, "Extension of CHWCryptographic Key Assignment Scheme in a Hierarchy," IEE Proceedings of Computers and Digital Techniques, Vol. 146, No. 4, January 1999, pp. 219.
  • [11] M.-S. Hwang, "An Improvement of Novel Cryptographic Key Assignment Schemes in a Tree Hierarchy," Computers & Mathematics with Applications, Vol. 37, No. 3, 1999, pp. 19-22.
  • [12] M.-S. Hwang, "An Improvement of Novel Cryptographic Key Assignment Scheme for Dynamic Access Control in a Hierarchy," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E82-A, No. 3, March 1999, pp. 548-550.
  • [13] M.-S. Hwang, "A New Dynamic Cryptographic Key Generation Scheme in a Hierarchy," Nordic Journal of Computing, Vol. 6, No. 4, 1999, pp. 363-371.
  • [14] M.-S. Hwang, "Cryptanalysis of YCN Key Assignment Scheme in a Hierarchy," Information Processing Letters, Vol. 73, No. 3, 2000, pp. 97-101.
  • [15] M.-S. Hwang, "An Asymmetric Cryptographic Scheme for a Totally-ordered Hierarchy," Journal of Computer Mathematics, Vol. 73, 2000, pp. 463-468.
  • [16] S. J.Mackinnon, P. D. Taylor, H.Meijer, and S. G. Akl, "An Optimal Algorithm for Assigning Cryptographic Keys to Control Access in a Hierarchy," IEEE Transactions on Computers, Vol. 34, No. 9, September 1985, pp. 797-802.
  • [17] R. S. Sandhu, "Cryptographic Implementation of a Tree Hierarchy for Access Control," Information Processing Letters, Vol. 27, No. 2, February 1988, pp. 95-98.
  • [18] J.-H. Yeh, R. Chow, and R. Newman, "A Key Assignment for Enforcing Access Control Policy Exception," Proceedings of the International Symposium on Internet Technology, Taipei, 1998, pp. 54-59.
Typ dokumentu
Bibliografia
Identyfikatory
Identyfikator YADDA
bwmeta1.element.baztech-article-BUS5-0009-0031
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.