Full metadata record
DC FieldValueLanguage
dc.contributor.authorSHAO, BMen_US
dc.contributor.authorHWANG, JJen_US
dc.contributor.authorWANG, PCen_US
dc.date.accessioned2014-12-08T15:04:08Z-
dc.date.available2014-12-08T15:04:08Z-
dc.date.issued1994-02-01en_US
dc.identifier.issn0167-4048en_US
dc.identifier.urihttp://hdl.handle.net/11536/2644-
dc.description.abstractThe problem of how to control access in a user hierarchy by cryptography was explored recently. However, these researchers focus on the centralized environment. This paper presents a new distributed approach to assigning cryptographic keys which enables a member of the organization to derive, from his own key, the keys of members below him in the hierarchy, and consequently to have access to information enciphered under those keys. This proposed scheme also maintains the strength of adding new security classes into a partially ordered hierarchy without affecting the existing keys.en_US
dc.language.isoen_USen_US
dc.subjectACCESS CONTROLen_US
dc.subjectCRYPTOGRAPHYen_US
dc.subjectKEY ASSIGNMENTen_US
dc.subjectDISTRIBUTED ALGORITHMen_US
dc.subjectDESen_US
dc.titleDISTRIBUTED ASSIGNMENT OF CRYPTOGRAPHIC KEYS FOR ACCESS-CONTROL IN A HIERARCHYen_US
dc.typeArticleen_US
dc.identifier.journalCOMPUTERS & SECURITYen_US
dc.citation.volume13en_US
dc.citation.issue1en_US
dc.citation.spage79en_US
dc.citation.epage84en_US
dc.contributor.department資訊管理與財務金融系 註:原資管所+財金所zh_TW
dc.contributor.departmentDepartment of Information Management and Financeen_US
dc.identifier.wosnumberWOS:A1994PT92500010-
dc.citation.woscount6-
Appears in Collections:Articles