Tolerant key assignment for enforcing complicated access control policies in a hierarchy
From MaRDI portal
Publication:3429635
Recommendations
- A simple key assignment for access control based on polynomial
- Cryptographic key assignment schemes for any access control policy
- Simple, efficient and strongly KI-secure hierarchical key assignment schemes
- A cryptographic key assignment scheme for access control in a hierarchy with exceptions
- Coding and Cryptography
Cited in
(10)- An efficient key assignment scheme for access control in a large leaf class hierarchy
- Simple, efficient and strongly KI-secure hierarchical key assignment schemes
- Cryptographically-enforced hierarchical access control with multiple keys
- Hierarchical key assignment with dynamic read-write privilege enforcement and extended KI-security
- A simple key assignment for access control based on polynomial
- Enforcing non-hierarchical access policies by hierarchical key assignment schemes
- A secure effective key management scheme for dynamic access control in a large leaf class hierarchy
- Security enhancement of Yang-Li hierarchical access control mechanism
- A cryptographic key assignment scheme for access control in a hierarchy with exceptions
- Cryptographic key assignment schemes for any access control policy
This page was built for publication: Tolerant key assignment for enforcing complicated access control policies in a hierarchy
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3429635)