Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | SHAO, BM | en_US |
dc.contributor.author | HWANG, JJ | en_US |
dc.contributor.author | WANG, PC | en_US |
dc.date.accessioned | 2014-12-08T15:04:08Z | - |
dc.date.available | 2014-12-08T15:04:08Z | - |
dc.date.issued | 1994-02-01 | en_US |
dc.identifier.issn | 0167-4048 | en_US |
dc.identifier.uri | http://hdl.handle.net/11536/2644 | - |
dc.description.abstract | The problem of how to control access in a user hierarchy by cryptography was explored recently. However, these researchers focus on the centralized environment. This paper presents a new distributed approach to assigning cryptographic keys which enables a member of the organization to derive, from his own key, the keys of members below him in the hierarchy, and consequently to have access to information enciphered under those keys. This proposed scheme also maintains the strength of adding new security classes into a partially ordered hierarchy without affecting the existing keys. | en_US |
dc.language.iso | en_US | en_US |
dc.subject | ACCESS CONTROL | en_US |
dc.subject | CRYPTOGRAPHY | en_US |
dc.subject | KEY ASSIGNMENT | en_US |
dc.subject | DISTRIBUTED ALGORITHM | en_US |
dc.subject | DES | en_US |
dc.title | DISTRIBUTED ASSIGNMENT OF CRYPTOGRAPHIC KEYS FOR ACCESS-CONTROL IN A HIERARCHY | en_US |
dc.type | Article | en_US |
dc.identifier.journal | COMPUTERS & SECURITY | en_US |
dc.citation.volume | 13 | en_US |
dc.citation.issue | 1 | en_US |
dc.citation.spage | 79 | en_US |
dc.citation.epage | 84 | en_US |
dc.contributor.department | 資訊管理與財務金融系 註:原資管所+財金所 | zh_TW |
dc.contributor.department | Department of Information Management and Finance | en_US |
dc.identifier.wosnumber | WOS:A1994PT92500010 | - |
dc.citation.woscount | 6 | - |
Appears in Collections: | Articles |