Provably-secure time-bound hierarchical key assignment schemes
A time-bound hierarchical key assignment scheme is a method to assign time-dependent
encryption keys to a set of classes in a partially ordered hierarchy, in such a way that the key …
encryption keys to a set of classes in a partially ordered hierarchy, in such a way that the key …
On key assignment for hierarchical access control
A key assignment scheme is a cryptographic technique for implementing an information flow
policy, sometimes known as hierarchical access control. All the research to date on key …
policy, sometimes known as hierarchical access control. All the research to date on key …
An efficient time-bound hierarchical key management scheme for secure broadcasting
In electronic subscription and pay TV systems, data can be organized and encrypted using
symmetric key algorithms according to predefined time periods and user privileges and then …
symmetric key algorithms according to predefined time periods and user privileges and then …
Achieving simple, secure and efficient hierarchical access control in cloud computing
Access control is an indispensable security component of cloud computing, and hierarchical
access control is of particular interest since in practice one is entitled to different access …
access control is of particular interest since in practice one is entitled to different access …
Role‐based and time‐bound access and management of EHR data
R Zhang, L Liu, R Xue - Security and communication Networks, 2014 - Wiley Online Library
Security and privacy are widely recognized as important requirements for access and
management of electronic health record (EHR) data. In this paper, we argue that EHR data …
management of electronic health record (EHR) data. In this paper, we argue that EHR data …
A higher-level security scheme for key access on cloud computing
In this work, we construct a key access management scheme that seamlessly transitions any
hierarchical-like access policy to the digital medium. The proposed scheme allows any …
hierarchical-like access policy to the digital medium. The proposed scheme allows any …
Key indistinguishability versus strong key indistinguishability for hierarchical key assignment schemes
A hierarchical key assignment scheme is a method to assign some private information and
encryption keys to a set of classes in a partially ordered hierarchy, in such a way that the …
encryption keys to a set of classes in a partially ordered hierarchy, in such a way that the …
Supporting dynamic updates in storage clouds with the Akl–Taylor scheme
With the wide diffusion of cloud technologies, an ever increasing amount of sensitive data is
moved on centralized network-based repository services, providing elastic outsourced …
moved on centralized network-based repository services, providing elastic outsourced …
A Hierarchical Key Assignment Scheme: A Unified Approach for Scalability and Efficiency
This study introduces a hierarchical key assignment scheme (HKAS) based on the closest
vector problem in an inner product space (CVP-IPS). The proposed scheme offers a …
vector problem in an inner product space (CVP-IPS). The proposed scheme offers a …
Merging: An efficient solution for a time-bound hierarchical key assignment scheme
SY Wang, CS Laih - IEEE Transactions on Dependable and …, 2006 - ieeexplore.ieee.org
Conventional hierarchical key assignment schemes have not been concerned with a
practical situation: Users might be assigned to a class for only a period of time. When a user …
practical situation: Users might be assigned to a class for only a period of time. When a user …