Enforcing non-hierarchical access policies by hierarchical key assignment schemes
From MaRDI portal
Publication:990103
DOI10.1016/J.IPL.2009.10.005zbMATH Open1197.94214OpenAlexW2043350203MaRDI QIDQ990103FDOQ990103
Authors: Jyh-Haw Yeh
Publication date: 2 September 2010
Published in: Information Processing Letters (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ipl.2009.10.005
Recommendations
- Tolerant key assignment for enforcing complicated access control policies in a hierarchy
- Cryptographically-enforced hierarchical access control with multiple keys
- A cryptographic key assignment scheme for access control in a hierarchy with exceptions
- A cryptographic key assignment scheme in a hierarchy for access control
- Cryptographic key assignment schemes for any access control policy
- Hierarchical key assignment with dynamic read-write privilege enforcement and extended KI-security
- An asymmetric cryptographuic key assignment scheme for access control in totally-ordered hierarchies∗
- Key hierarchies for hierarchical access control in secure group communications
Cites Work
Cited In (1)
This page was built for publication: Enforcing non-hierarchical access policies by hierarchical key assignment schemes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q990103)