A scheme based on cryptography is proposed for access control in a system where hierarchy is represented by a partially ordered set (or poset). Straightforward implementation of the scheme requires users highly placed in the hierarchy to store a large number of cryptographic keys. A timeversus-stora
โฆ LIBER โฆ
Cryptographic solution to a problem of access control in a hierarchy
โ Scribed by Akl, Selim G.; Taylor, Peter D.
- Book ID
- 126029932
- Publisher
- Association for Computing Machinery
- Year
- 1983
- Tongue
- English
- Weight
- 501 KB
- Volume
- 1
- Category
- Article
- ISSN
- 0734-2071
No coin nor oath required. For personal study only.
๐ SIMILAR VOLUMES
Cryptographic solution to a problem of a
โ
Akl, Selim G.; Taylor, Peter D.
๐
Article
๐
1983
๐
Association for Computing Machinery
๐
English
โ 501 KB
Cryptographic implementation of a tree h
โ
Ravinderpal S. Sandhu
๐
Article
๐
1988
๐
Elsevier Science
๐
English
โ 396 KB
Cryptographic key assignment scheme for
โ
Chin-Chen Chang; Ren-Junn Hwang; Tzong-Chen Wu
๐
Article
๐
1992
๐
Elsevier Science
๐
English
โ 479 KB
A cryptographic implementation for dynam
โ
Tsai Hui-Min; Chang Chin-Chen
๐
Article
๐
1995
๐
Elsevier Science
๐
English
โ 729 KB
A cryptographic key assignment scheme in
โ
Hwang Min-Shiang
๐
Article
๐
1997
๐
Elsevier Science
๐
English
โ 416 KB
Access control is one of the mechanisms for data protection in a computer system. Many literaturee besed on cryptography have been proposed to solve the problem of access control in hierarchic structurea. Recently, Liaw and Lei proposed an optimal heuristic algorithm for multilevel data security. Bu
Distributed assignment of cryptographic
โ
Bao-Min Shao; Jing-Jang Hwang; PeCheng Wang
๐
Article
๐
1994
๐
Elsevier Science
๐
English
โ 507 KB