A simple key assignment for access control based on polynomial
From MaRDI portal
Publication:2391656
Recommendations
- Tolerant key assignment for enforcing complicated access control policies in a hierarchy
- Cryptographic key assignment schemes for any access control policy
- Controlling access in tree hierarchies
- Coding and Cryptography
- A cryptographic key assignment scheme for access control in a hierarchy with exceptions
Cites work
Cited in
(12)- A model of hierarchical key assignment scheme
- Tolerant key assignment for enforcing complicated access control policies in a hierarchy
- Key hierarchies for hierarchical access control in secure group communications
- An information-theoretic approach to the access control problem.
- An efficient key assignment scheme based on one-way hash function in a user hierarchy
- Cryptographic key assignment schemes for any access control policy
- Unconditionally secure key assignment schemes
- scientific article; zbMATH DE number 4168386 (Why is no real title available?)
- An efficient key assignment scheme for access control in a large leaf class hierarchy
- A novel access control method using Morton number and prime factorization
- Key management for content access control in a hierarchy
- A novel key management scheme for dynamic access control in a user hierarchy
This page was built for publication: A simple key assignment for access control based on polynomial
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2391656)