A NEW CLASS OF KEY MANAGEMENT SCHEME FOR ACCESS CONTROL IN DYNAMIC HIERARCHIES

X. Zou∗ and L. Bai∗∗

References

  1. [1] A. Silberschatz, P.B. Galvin, & G. Gagne, Operating systemconcepts, Sixth Edition (Hoboken, NJ: John Wiley & Sons,Inc., 2001).
  2. [2] R.S. Sandhu, E.J. Coyne, H.L. Feinstein, & C.E. Youman,Role-based access control models, IEEE Computer, 29(2),1996, 38–47.
  3. [3] H. Wang, J. Cao, & Y. Zhang, A flexible payment scheme andits role-based access control, IEEE Transactions on Knowledgeand Data Engineering, 17(3), 2005, 425–436.
  4. [4] S.G. Akl & P.D. Taylor, A cryptographic solution to theproblem of access control in a hierarchy, ACM Transactionson Computer Systems (TOCS), 1(3), 1983, 239–248.
  5. [5] S.J. MacKinnon, P.D. Taylor, H. Meijer, & S.G. Akl, Anoptimal algorithm for assigning cryptographic keys to controlaccess in a hierarchy, IEEE Transactions on Computers, 34(9),1985, 797–802.
  6. [6] T.-S. Chen, Y.-F. Chung, & C.-S. Tian, A novel key manage-ment scheme for dynamic access control in a user hierarchy, inProceedings of the 28th Annual International Computer Soft-ware and Applications Conference (COMPSAC), Hong Kong,China, 2004, 396–401.
  7. [7] G.C. Chick & S.E. Tavares, Flexible access control with masterkeys, Proceedings on Advances in Cryptology: CRYPTO ’89,LNCS, Santa Barbara, CA, USA, 1989, 316–322.
  8. [8] M.L. Das, A. Saxena, V.P. Gulati, & D.B. Phatak, Hierarchi-cal key management scheme using polynomial interpolation,SIGOPS Operating Systems Review, 39(1), 2005, 40–47.
  9. [9] L. Harn & H.Y. Lin, A cryptographic key generation schemefor multilevel data security, Computers and Security, 9(6),1990, 539–546.
  10. [10] M.-S. Hwang, C.-H. Liu, & J.-W. Lo, An efficient key assign-ment for access control in large partially ordered hierarchy,Journal of Systems and Software, 67(2), 2004, 99–107.
  11. [11] C.H. Lin, Dynamic key management scheme for access controlin a hierarchy, Computer Communications, 20(15), 1997, 1381–1385.
  12. [12] I. Ray, I. Ray, & N. Narasimhamurthi, A cryptographic solutionto implement access control in a hierarchy and more, SACMAT’02: Proceedings of the seventh ACM symposium on Accesscontrol models and technologies, Monterey, CA, USA, 2002,65–73.
  13. [13] R.S. Sandhu, Cryptographic implementation of a tree hierarchyfor access control, Information Processing Letter, 27(2), 1998,95–98.
  14. [14] V.R.L. Shen & T.-S. Chen, A novel key management schemebased on discrete logarithms and polynomial interpolations,Computers and Security, 21(2), 2002, 164–171.
  15. [15] S. Zhong, A practical key management scheme for accesscontrol in a user hierarchy, Computers and Security, 21(8),2002, 750–759.
  16. [16] X. Zou, B. Ramamurthy, & S. Magliveras, Chinese remaindertheorem based hierarchical access control for secure groupcommunications, Lecture Notes in Computer Science (LNCS),2229, 2001, 381–385.
  17. [17] D.R. Stinson, Cryptography: Theory and practice, Third Edi-tion (Boca Raton, USA: CRC Press, 2005).
  18. [18] X. Zou, B. Ramamurthy, & S.S. Magliveras, editors, Securegroup communications over data networks (New York, NY,USA: Springer, 2004).
  19. [19] M.J. Atallah, K.B. Frikken, & M. Blanton, Dynamic andefficient key management for access hierarchies, ACM CCS’05,Alexandria, VA, USA, 2005, 190–202.
  20. [20] H. Chien, An efficient time-bound hierarchical key assign-ment scheme, IEEE Transactions on Knowledge and DataEngineering, 16(10), 2004, 1301–1304.
  21. [21] X. Yi, Security of chien’s efficient time-bound hierarchical keyassignment scheme, IEEE Transactions on Knowledge andData Engineering, 17(9), 2005, 1298–1299.
  22. [22] T. Wu & C. Chang, Cryptographic key assignment scheme forhierarchical access control, International Journal of ComputerSystems Science and Engineering, 16(1), 2001, 25–28.
  23. [23] C.L. Hsu & Z.S. Wu, Cryptanalyses and improvements oftwo cryptographic key assignment schemes for dynamic accesscontrol in a user hierarchy, Computers and Security, 22(5),2003, 453–456.
  24. [24] S.Y. Wang & C.S. Laih, Cryptanalyses of two key assignmentschemes based on polynomial interpolations, Computers andSecurity, 24, 2005, 134–138.
  25. [25] N.Y. Lee & T. Hwang, Comments on dynamic key manage-ment schemes for access control in a hierarchy, ComputerCommunication, 22(1), 1999, 87–89.
  26. [26] C. Blundo, L.A.F. Mattos, & D.R. Stinson, Generalied beimel-chor scheme for broadcast encryption and interactive keydistribution, Theoretical Computer Science, 200, 1998, 313–334.
  27. [27] A.D. Santis, A.L. Ferrara, & B. Masucci, Unconditionallysecure key assignment schemes, Discrete Applied Mathematics,154(2), 2006, 234–252.
  28. [28] A. Shamir, How to share a secret, Communications of theACM, 22(1), 1979, 612–613.

Important Links:

Go Back