Sciweavers

18 search results - page 1 / 4
» Managing key hierarchies for access control enforcement: Heu...
Sort
View
COMPSEC
2010
98views more  COMPSEC 2010»
13 years 5 months ago
Managing key hierarchies for access control enforcement: Heuristic approaches
Carlo Blundo, Stelvio Cimato, Sabrina De Capitani ...
AINA
2007
IEEE
13 years 11 months ago
Heuristics for Improving Cryptographic Key Assignment in a Hierarchy
In hierarchical distributed systems, shared data access can be controlled by assigning user groups single cryptographic keys that allow high level users derive low level keys, but...
Anne V. D. M. Kayem, Patrick Martin, Selim G. Akl
CN
2007
111views more  CN 2007»
13 years 5 months ago
Key management for content access control in a hierarchy
The need for content access control in hierarchies (CACH) appears naturally in all contexts where a set of users have different access rights to a set of resources. The hierarchy...
H. Ragab Hassen, Abdelmadjid Bouabdallah, Hatem Be...
ECUMN
2007
Springer
13 years 11 months ago
Enforcing Access Control Using Risk Assessment
Context-based access control is an emerging approach for modeling adaptive solution, making access control management more flexible and powerful. But in the ubiquitous environment...
Nguyen Ngoc Diep, Le Xuan Hung, Yonil Zhung, Sungy...
AINA
2005
IEEE
13 years 10 months ago
Efficient Secret Sharing with Access Structures in a Hierarchy
2004, Chang et al. suggested an approach that solves the problem of secret sharing with access structures in a hierarchy. They used the concept of discrete logarithmto reuse shado...
Chu-Hsing Lin, Wei Lee