A Novel Key Management Scheme for Dynamic Access Control in a Hierarchy
نویسندگان
چکیده
Shen and Chen proposed a novel key management scheme for dynamic access control in a hierarchy. In this article, the authors shall present an improved version of Shen and Chen’s scheme to reduce the computational time required for key generation and derivation.
منابع مشابه
An Improvement of Novel Cryptographic Key Assignment Scheme for Dynamic Access Control in a Hierarchy
This letter presents a cryptographic key assignment scheme for dynamic access control in a hierarchy. A scheme for extending a previous cryptographic key assignment scheme to reduce the computation required for key generation and derivation algorithms is also proposed.
متن کاملAn Efficient and Secure Key Management Scheme for Hierarchical Access Control Based on ECC
In a key management scheme for hierarchy based access control, each security class having higher clearance can derive the cryptographic secret keys of its other security classes having lower clearances. In 2006 Jeng-Wang proposed an efficient scheme on access control in user hierarchy based on elliptic curve cryptosystem. Their scheme provides solution of key management efficiently for dynamic ...
متن کاملDetecting Flaws in Dynamic Hierarchical Key Management Schemes Using Specification Animation
In the key assignment schemes for hierarchical access control systems, each access class has a key associated with it that can be used to derive the keys associated with every descendant of that class. Typically, a class requires public and secret information to derive the keys of its descendant classes. There have been many key assignment schemes proposed in recent years that support updates t...
متن کاملA Novel Dynamic Role-Based Access Control Scheme in User Hierarchy
Role-based access control is an important mechanism to prevent the unauthorized access in terms of roles. User hierarchy is an efficient structure to express the relations between different roles. The combination between role-based access control and the user hierarchy is required in different context, especially in open internet environment where the published or delegated data are encrypted f...
متن کاملA Cryptographic Key Assignment Scheme with Adaptable Time- token Constraint in a Hierarchy
A scheme, which uses flexible cryptographic key management upon adaptable time-token constraint for a user hierarchy access control (UHAC) scheme, is proposed in this paper. For adapting the changeability in a UHAC system, we propose a technique of assigning independent time-token which is distributed by a trusted agency server to reply an authorized user for once secure access request. The key...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- I. J. Network Security
دوره 12 شماره
صفحات -
تاریخ انتشار 2011