Controlling access in tree hierarchies
From MaRDI portal
Recommendations
- scientific article; zbMATH DE number 1941233
- Tree-based cryptographic access control
- Coding and Cryptography
- Access control in a hierarchy using a one-way trap door function
- Key management for content access control in a hierarchy
- XML access control with policy matching tree
- Role hierarchies and constraints for lattice-based access controls
- An optimal algorithm to assign cryptographic keys in a tree structure for access control
- An efficient key assignment scheme for access control in a large leaf class hierarchy
Cites work
Cited in
(13)- Information Security and Privacy
- An improvement of a dynamic cryptographic key assignment scheme in a tree hierarchy
- An efficient key assignment scheme based on one-way hash function in a user hierarchy
- scientific article; zbMATH DE number 1941233 (Why is no real title available?)
- A simple key assignment for access control based on polynomial
- Information Security
- An efficient key assignment scheme for access control in a large leaf class hierarchy
- A quantum cryptographic solution to the problem of access control in a hierarchy
- Tree-based cryptographic access control
- A secure effective key management scheme for dynamic access control in a large leaf class hierarchy
- Key management for content access control in a hierarchy
- A cryptographic key assignment scheme for access control in a hierarchy with exceptions
- An Access Control Scheme for Partially Ordered Set Hierarchy with Provable Security
This page was built for publication: Controlling access in tree hierarchies
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1328542)