๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

Cryptographic key assignment scheme for dynamic access control in a user hierarchy

โœ Scribed by Kuo, F.H.; Shen, V.R.L.; Chen, T.S.; Lai, F.


Book ID
114448379
Publisher
The Institution of Electrical Engineers
Year
1999
Tongue
English
Weight
629 KB
Volume
146
Category
Article
ISSN
1350-2387

No coin nor oath required. For personal study only.


๐Ÿ“œ SIMILAR VOLUMES


Cryptanalyses and improvements of two cr
โœ Chien-Lung Hsu; Tzong-Sun Wu ๐Ÿ“‚ Article ๐Ÿ“… 2003 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 152 KB

## Recently, Wu and Chang and Shen and Chen separately proposed a cryptographic key assignment scheme for solving access control problem in a partially ordered user hierarchy. However, this paper will show the security leaks inherent in both schemes based on polynomial interpolations. That is, the u

A cryptographic key assignment scheme in
โœ Hwang Min-Shiang ๐Ÿ“‚ Article ๐Ÿ“… 1997 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 416 KB

Access control is one of the mechanisms for data protection in a computer system. Many literaturee besed on cryptography have been proposed to solve the problem of access control in hierarchic structurea. Recently, Liaw and Lei proposed an optimal heuristic algorithm for multilevel data security. Bu