Tolerant key assignment for enforcing complicated access control policies in a hierarchy
From MaRDI portal
Publication:3429635
zbMATH Open1111.68033MaRDI QIDQ3429635FDOQ3429635
Authors: Ya-Fen Chang, Chin-Chen Chang
Publication date: 2 April 2007
Recommendations
- A simple key assignment for access control based on polynomial
- Cryptographic key assignment schemes for any access control policy
- Simple, efficient and strongly KI-secure hierarchical key assignment schemes
- A cryptographic key assignment scheme for access control in a hierarchy with exceptions
- Coding and Cryptography
Cited In (10)
- Enforcing non-hierarchical access policies by hierarchical key assignment schemes
- Cryptographically-enforced hierarchical access control with multiple keys
- Cryptographic key assignment schemes for any access control policy
- A simple key assignment for access control based on polynomial
- Hierarchical key assignment with dynamic read-write privilege enforcement and extended KI-security
- Simple, efficient and strongly KI-secure hierarchical key assignment schemes
- Security enhancement of Yang-Li hierarchical access control mechanism
- An efficient key assignment scheme for access control in a large leaf class hierarchy
- A secure effective key management scheme for dynamic access control in a large leaf class hierarchy
- A cryptographic key assignment scheme for access control in a hierarchy with exceptions
This page was built for publication: Tolerant key assignment for enforcing complicated access control policies in a hierarchy
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3429635)