On key assignment for hierarchical access control

J Crampton, K Martin, P Wild - 19th IEEE Computer Security …, 2006 - ieeexplore.ieee.org
A key assignment scheme is a cryptographic technique for implementing an information flow
policy, sometimes known as hierarchical access control. All the research to date on key …

An efficient privacy-aware authentication scheme with hierarchical access control for mobile cloud computing services

L **ong, F Li, M He, Z Liu, T Peng - IEEE Transactions on cloud …, 2020 - ieeexplore.ieee.org
In the last few years, mobile cloud computing (MCC) gains a huge development because of
the popularity of mobile applications and cloud computing. User authentication and access …

[SÁCH][B] Secure group communications over data networks

X Zou, B Ramamurthy, SS Magliveras - 2004 - books.google.com
The ubiquitous nature of the Internet is enabling a new generation of-pUcations to support
collaborative work among geographically distant users. Security in such an environment is …

Key management for multiple multicast groups in wireless networks

MH Park, YH Park, HY Jeong… - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
With the emergence of diverse group-based services, multiple multicast groups are likely to
coexist in a single network, and users may subscribe to multiple groups simultaneously …

Key management for content access control in a hierarchy

HR Hassen, A Bouabdallah, H Bettahar, Y Challal - Computer Networks, 2007 - Elsevier
The need for content access control in hierarchies (CACH) appears naturally in all contexts
where a set of users have different access rights to a set of resources. The hierarchy is …

A practical key management scheme for access control in a user hierarchy

S Zhong - Computers & Security, 2002 - Elsevier
In a user hierarchy we say that a security class is subordinate to another security class if the
former has a lower security privilege than the latter. To implement such a hierarchical …

An efficient key management scheme for content access control for linear hierarchies

HR Hassen, H Bettahar, A Bouadbdallah, Y Challal - Computer Networks, 2012 - Elsevier
The content access control problem appears in any context with a set of users and
resources. The difference in access rights of the users defines classes, where members of a …

Multiple multicast group key management for the Internet of People

H Zhong, W Luo, J Cui - Concurrency and Computation …, 2017 - Wiley Online Library
Group key management (GKM) is an important research topic in mobile multicast
communication nowadays. With the development of multiple services based on groups, it …

[PDF][PDF] 1SECURE ENERGY EFFICIENT ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORK

DAS Ayan Kumar, R Chaki, KN Dey - Foundations of Computing and …, 2016 - sciendo.com
The ease of deployment of economic sensor networks has always been a boon to disaster
management applications. However, their vulnerability to a number of security threats makes …

Certificateless public verification for data storage and sharing in the cloud

L Huang, J Zhou, G Zhang… - Chinese Journal of …, 2020 - Wiley Online Library
By advances in cloud computing, users are allowed to remotely store their data in the cloud,
manage the stored data without limitation of time and place, and give rights to visitors that …