Key management in tree shaped hierarchies
نویسندگان
چکیده
منابع مشابه
KEY MANAGEMENT FOR NON - TREE ACCESS HIERARCHIES by Mikhail
Access hierarchies are useful in many applications and are modeled as a set of access classes organized by a partial order. A user who obtains access to a class in such a hierarchy is entitled to access objects stored at that class, as well as objects stored at its descendant classes. Efficient schemes for this framework assign only one key to a class and use key derivation to permit access to ...
متن کاملA Conference Key Distribution Scheme in Tree Hierarchies
A new conference key distribution scheme is proposed in this study for access control in a hierarchy. A group of users with a different security class can generate a common secret key over a public channel so that a secure electronic conference can be held. The security classes form a hierarchy such that users in a higher security class can obtain a secret session key with users in the same or ...
متن کاملImproving Indirect Key Management Scheme of Access Hierarchies
This paper examines possible modifications to indirect key management schemes that may improve their performance and efficiency for use within access hierarchies. A new method is proposed which uses a dedicated HMAC construction as the key transformation function, a new addressing strategy to improve accessibility verification, and a cached key update strategy which seeks to minimize key update...
متن کاملAn Asymmetric Cryptographic Key Assignment Scheme for Access Control in Tree Structural Hierarchies
In a hierarchical structure, a user in a security class has access to information items of another class if and only if the former class is a predecessor of latter. Based upon cryptographic techniques, several schemes have been proposed for solving the problem of access control in hierarchical structures. In this paper, we propose a new scheme for an access control in tree structural hierarchie...
متن کاملTree Based Protocol for Key Management in Wireless Sensor Networks
Securing a wireless communication has generally a vital importance, particularly when this communication is in a hostile environment like in wireless sensor networks (WSNs). The problem is how to create cryptographic keys between sensor nodes to ensure secure communications. Limited resources of sensor nodes make a public key cryptosystem such as RSA not feasible. So, most solutions rely on a s...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Information Security Journal: A Global Perspective
سال: 2018
ISSN: 1939-3555,1939-3547
DOI: 10.1080/19393555.2018.1516835