Cryptographically-enforced hierarchical access control with multiple keys
From MaRDI portal
Recommendations
- Simple, efficient and strongly KI-secure hierarchical key assignment schemes
- A cryptographic key assignment scheme for access control in a hierarchy with exceptions
- Cryptographic key assignment schemes for any access control policy
- Tolerant key assignment for enforcing complicated access control policies in a hierarchy
- A cryptographic key assignment scheme in a hierarchy for access control
Cites work
Cited in
(6)- Enforcing non-hierarchical access policies by hierarchical key assignment schemes
- Simple, efficient and strongly KI-secure hierarchical key assignment schemes
- Time-storage trade-offs for cryptographically-enforced access control
- Cryptanalysis on an access control in a hierarchy
- Tree-based cryptographic access control
- An efficient solution for hierarchical access control problem in cloud environment
This page was built for publication: Cryptographically-enforced hierarchical access control with multiple keys
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1035675)