Provably-secure time-bound hierarchical key assignment schemes

G Ateniese, A De Santis, AL Ferrara… - Proceedings of the 13th …, 2006 - dl.acm.org
A time-bound hierarchical key assignment scheme is a method to assign time-dependent
encryption keys to a set of classes in a partially ordered hierarchy, in such a way that the key …

On key assignment for hierarchical access control

J Crampton, K Martin, P Wild - 19th IEEE Computer Security …, 2006 - ieeexplore.ieee.org
A key assignment scheme is a cryptographic technique for implementing an information flow
policy, sometimes known as hierarchical access control. All the research to date on key …

An efficient time-bound hierarchical key management scheme for secure broadcasting

E Bertino, N Shang… - IEEE transactions on …, 2008 - ieeexplore.ieee.org
In electronic subscription and pay TV systems, data can be organized and encrypted using
symmetric key algorithms according to predefined time periods and user privileges and then …

Achieving simple, secure and efficient hierarchical access control in cloud computing

S Tang, X Li, X Huang, Y **ang… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Access control is an indispensable security component of cloud computing, and hierarchical
access control is of particular interest since in practice one is entitled to different access …

Role‐based and time‐bound access and management of EHR data

R Zhang, L Liu, R Xue - Security and communication Networks, 2014 - Wiley Online Library
Security and privacy are widely recognized as important requirements for access and
management of electronic health record (EHR) data. In this paper, we argue that EHR data …

A higher-level security scheme for key access on cloud computing

B Celiktas, I Celikbilek, E Ozdemir - IEEE Access, 2021 - ieeexplore.ieee.org
In this work, we construct a key access management scheme that seamlessly transitions any
hierarchical-like access policy to the digital medium. The proposed scheme allows any …

Key indistinguishability versus strong key indistinguishability for hierarchical key assignment schemes

A Castiglione, A De Santis… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
A hierarchical key assignment scheme is a method to assign some private information and
encryption keys to a set of classes in a partially ordered hierarchy, in such a way that the …

Supporting dynamic updates in storage clouds with the Akl–Taylor scheme

A Castiglione, A De Santis, B Masucci, F Palmieri… - Information …, 2017 - Elsevier
With the wide diffusion of cloud technologies, an ever increasing amount of sensitive data is
moved on centralized network-based repository services, providing elastic outsourced …

A Hierarchical Key Assignment Scheme: A Unified Approach for Scalability and Efficiency

I Celikbilek, B Celiktas, E Ozdemir - IEEE Access, 2024 - ieeexplore.ieee.org
This study introduces a hierarchical key assignment scheme (HKAS) based on the closest
vector problem in an inner product space (CVP-IPS). The proposed scheme offers a …

Merging: An efficient solution for a time-bound hierarchical key assignment scheme

SY Wang, CS Laih - IEEE Transactions on Dependable and …, 2006 - ieeexplore.ieee.org
Conventional hierarchical key assignment schemes have not been concerned with a
practical situation: Users might be assigned to a class for only a period of time. When a user …