Tolerant key assignment for enforcing complicated access control policies in a hierarchy
From MaRDI portal
Publication:3429635
Recommendations
- A simple key assignment for access control based on polynomial
- Cryptographic key assignment schemes for any access control policy
- Simple, efficient and strongly KI-secure hierarchical key assignment schemes
- A cryptographic key assignment scheme for access control in a hierarchy with exceptions
- Coding and Cryptography
Cited in
(10)- Enforcing non-hierarchical access policies by hierarchical key assignment schemes
- Cryptographically-enforced hierarchical access control with multiple keys
- Cryptographic key assignment schemes for any access control policy
- A simple key assignment for access control based on polynomial
- Hierarchical key assignment with dynamic read-write privilege enforcement and extended KI-security
- Simple, efficient and strongly KI-secure hierarchical key assignment schemes
- An efficient key assignment scheme for access control in a large leaf class hierarchy
- Security enhancement of Yang-Li hierarchical access control mechanism
- A secure effective key management scheme for dynamic access control in a large leaf class hierarchy
- A cryptographic key assignment scheme for access control in a hierarchy with exceptions
This page was built for publication: Tolerant key assignment for enforcing complicated access control policies in a hierarchy
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3429635)