Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Hwang, MS | en_US |
dc.contributor.author | Yang, WP | en_US |
dc.date.accessioned | 2014-12-08T15:40:29Z | - |
dc.date.available | 2014-12-08T15:40:29Z | - |
dc.date.issued | 2003-08-15 | en_US |
dc.identifier.issn | 0164-1212 | en_US |
dc.identifier.uri | http://dx.doi.org/10.1016/S0164-1212(02)00091-2 | en_US |
dc.identifier.uri | http://hdl.handle.net/11536/27637 | - |
dc.description.abstract | The problem of access control in a hierarchy is present in many application areas. Since computing resources have grown tremendously, access control is more frequently required in areas such as computer networks, database management systems, and operating systems. Many schemes based on cryptography have been proposed to solve this problem. However, previous schemes need large values associated with each security class. In this paper, we propose a new scheme to solve this problem achieving the following two goals. One is that the number of keys is reduced without affecting the security of the system. The other goal is that when a security class is added to the system, we need only update a few keys of the related security classes with simple operations. (C) 2002 Elsevier Inc. All rights reserved. | en_US |
dc.language.iso | en_US | en_US |
dc.subject | access control cryptography | en_US |
dc.subject | data security | en_US |
dc.subject | hierarchy | en_US |
dc.subject | key management | en_US |
dc.title | Controlling access in large partially ordered hierarchies using cryptographic keys | en_US |
dc.type | Article | en_US |
dc.identifier.doi | 10.1016/S0164-1212(02)00091-2 | en_US |
dc.identifier.journal | JOURNAL OF SYSTEMS AND SOFTWARE | en_US |
dc.citation.volume | 67 | en_US |
dc.citation.issue | 2 | en_US |
dc.citation.spage | 99 | en_US |
dc.citation.epage | 107 | en_US |
dc.contributor.department | 資訊工程學系 | zh_TW |
dc.contributor.department | Department of Computer Science | en_US |
dc.identifier.wosnumber | WOS:000184552300004 | - |
dc.citation.woscount | 19 | - |
Appears in Collections: | Articles |
Files in This Item:
If it is a zip file, please download the file and unzip it, then open index.html in a browser to view the full text content.