Dynamic and efficient key management for access hierarchies

MJ Atallah, M Blanton, N Fazio, KB Frikken - ACM Transactions on …, 2009 - dl.acm.org
Hierarchies arise in the context of access control whenever the user population can be
modeled as a set of partially ordered classes (represented as a directed graph). A user with …

Secure and efficient access to outsourced data

W Wang, Z Li, R Owens, B Bhargava - … of the 2009 ACM workshop on …, 2009 - dl.acm.org
Providing secure and efficient access to large scale outsourced data is an important
component of cloud computing. In this paper, we propose a mechanism to solve this …

On key assignment for hierarchical access control

J Crampton, K Martin, P Wild - 19th IEEE Computer Security …, 2006 - ieeexplore.ieee.org
A key assignment scheme is a cryptographic technique for implementing an information flow
policy, sometimes known as hierarchical access control. All the research to date on key …

Cryptographic hierarchical access control for dynamic structures

A Castiglione, A De Santis, B Masucci… - IEEE Transactions …, 2016 - ieeexplore.ieee.org
A hierarchical key assignment scheme is a method to assign some private information and
encryption keys to a set of classes in a partially ordered hierarchy, in such a way that the …

Efficient time-bound hierarchical key assignment scheme

HY Chen - IEEE Transactions on Knowledge and Data …, 2004 - ieeexplore.ieee.org
The access privileges in distributed systems can be effectively organized as a hierarchical
tree that consists of distinct classes. A hierarchical time-bound key assignment scheme is to …

A Hierarchical Key Assignment Scheme: A Unified Approach for Scalability and Efficiency

I Celikbilek, B Celiktas, E Ozdemir - IEEE Access, 2024 - ieeexplore.ieee.org
This study introduces a hierarchical key assignment scheme (HKAS) based on the closest
vector problem in an inner product space (CVP-IPS). The proposed scheme offers a …

Merging: An efficient solution for a time-bound hierarchical key assignment scheme

SY Wang, CS Laih - IEEE Transactions on Dependable and …, 2006 - ieeexplore.ieee.org
Conventional hierarchical key assignment schemes have not been concerned with a
practical situation: Users might be assigned to a class for only a period of time. When a user …

New hierarchical assignment without public key cryptography

HY Chien, JK Jan - Computers & Security, 2003 - Elsevier
The access privileges in many distributed systems can be effectively organized as a
hierarchical tree. Distributing distinct cryptographic keys to distinct entities, according to their …

Method and apparatus for managing shared passwords on a multi-user computer

S Kawano, T Inoue, DC Challener, PL Childs… - US Patent …, 2011 - Google Patents
A method for managing shared passwords on a multi-user computer system is disclosed. A
set of shared passwords and an administrator internal key are initially generated. After the …

Key management for non-tree access hierarchies

MJ Atallah, M Blanton, KB Frikken - … of the eleventh ACM symposium on …, 2006 - dl.acm.org
Access hierarchies are useful in many applications and are modeled as a set of access
classes organized by a partial order. A user who obtains access to a class in such a …