A simple key assignment for access control based on polynomial
From MaRDI portal
Publication:2391656
DOI10.1007/S13369-013-0535-ZzbMATH Open1337.94052OpenAlexW2004890175MaRDI QIDQ2391656FDOQ2391656
Authors: Jung-Wen Lo, Min-Shiang Hwang, Chia-Hsin Liu
Publication date: 5 August 2013
Published in: Arabian Journal for Science and Engineering (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s13369-013-0535-z
Recommendations
- Tolerant key assignment for enforcing complicated access control policies in a hierarchy
- Cryptographic key assignment schemes for any access control policy
- Controlling access in tree hierarchies
- Coding and Cryptography
- A cryptographic key assignment scheme for access control in a hierarchy with exceptions
Cites Work
Cited In (12)
- A model of hierarchical key assignment scheme
- Tolerant key assignment for enforcing complicated access control policies in a hierarchy
- An information-theoretic approach to the access control problem.
- Key hierarchies for hierarchical access control in secure group communications
- An efficient key assignment scheme based on one-way hash function in a user hierarchy
- Cryptographic key assignment schemes for any access control policy
- Unconditionally secure key assignment schemes
- Title not available (Why is that?)
- An efficient key assignment scheme for access control in a large leaf class hierarchy
- A novel access control method using Morton number and prime factorization
- Key management for content access control in a hierarchy
- A novel key management scheme for dynamic access control in a user hierarchy
This page was built for publication: A simple key assignment for access control based on polynomial
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2391656)