咨询与建议

限定检索结果

文献类型

  • 3 篇 会议
  • 2 篇 期刊文献

馆藏范围

  • 5 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5 篇 工学
    • 3 篇 计算机科学与技术...
    • 2 篇 软件工程
    • 1 篇 电气工程
    • 1 篇 信息与通信工程
    • 1 篇 控制科学与工程
  • 1 篇 理学
    • 1 篇 数学
    • 1 篇 统计学(可授理学、...
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 5 篇 key assignment s...
  • 2 篇 access control
  • 2 篇 information flow...
  • 2 篇 cryptography
  • 1 篇 hierarchical scr...
  • 1 篇 indexes
  • 1 篇 key-indistinguis...
  • 1 篇 flexible hierarc...
  • 1 篇 hcl2 gene
  • 1 篇 image colour ana...
  • 1 篇 internet
  • 1 篇 cyclic shift
  • 1 篇 image coding
  • 1 篇 scrambling
  • 1 篇 cyclic shifts
  • 1 篇 multi-key assign...
  • 1 篇 general poset
  • 1 篇 provably secure
  • 1 篇 palette-based im...
  • 1 篇 bit stream

机构

  • 2 篇 univ london info...
  • 1 篇 indian inst info...
  • 1 篇 chiba univ dept ...
  • 1 篇 royal holloway u...

作者

  • 2 篇 crampton jason
  • 1 篇 paterson kenneth...
  • 1 篇 aryal anu
  • 1 篇 freire eduarda s...
  • 1 篇 alderman james
  • 1 篇 farley naomi
  • 1 篇 imaizumi shoko
  • 1 篇 kumar naveen
  • 1 篇 lal sumit
  • 1 篇 aoki naokazu

语言

  • 4 篇 英文
  • 1 篇 其他
检索条件"主题词=Key Assignment Scheme"
5 条 记 录,以下是1-10 订阅
排序:
An efficient flexible hierarchical access control scheme enabling real-life exceptions
收藏 引用
SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES 2022年 第1期47卷 1-13页
作者: Lal, Sumit Kumar, Naveen Indian Inst Informat Technol Vadodara India
Most organizations today inherently followed hierarchical access control implemented using a hierarchical key assignment scheme (HKAS). An HKAS enforce reflexive, anti-symmetric, and transitive relations among the nod... 详细信息
来源: 评论
A Framework for the Cryptographic Enforcement of Information Flow Policies  22
A Framework for the Cryptographic Enforcement of Information...
收藏 引用
22nd ACM Symposium on Access Control Models and Technologies (SACMAT)
作者: Alderman, James Crampton, Jason Farley, Naomi Royal Holloway Univ London Informat Secur Grp Egham TW20 0EX Surrey England
It is increasingly common to outsource data storage to untrusted, third party (e.g. cloud) servers. However, in such settings, low-level online reference monitors may not be appropriate for enforcing read access, and ... 详细信息
来源: 评论
Hierarchical Scrambling scheme for Palette-Based Images
Hierarchical Scrambling Scheme for Palette-Based Images
收藏 引用
International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS)
作者: Aryal, Anu Imaizumi, Shoko Aoki, Naokazu Chiba Univ Dept Image & Mat Sci Div Informat Sci Grad Sch Adv Integrat SciInage Ku 1-33 Yayoi Cho Chiba 2638522 Japan
We present an efficient hierarchical scrambling scheme for palette-based images. The goal of hierarchical scrambling of a bit stream is to make the entire stream somehow difficult to decrypt. We decompose the original... 详细信息
来源: 评论
Provably Secure key assignment schemes from Factoring
Provably Secure Key Assignment Schemes from Factoring
收藏 引用
16th Australasian Conference on Information Security and Privacy (ACISP)
作者: Freire, Eduarda S. V. Paterson, Kenneth G. Univ London Informat Secur Grp London WC1E 7HU England
We provide constructions for key assignment schemes that are provably secure under the factoring assumption in the standard model. Our first construction is for simple "chain" hierarchies, and achieves secur... 详细信息
来源: 评论
Cryptographically-enforced hierarchical access control with multiple keys
收藏 引用
JOURNAL OF LOGIC AND ALGEBRAIC PROGRAMMING 2009年 第8期78卷 690-700页
作者: Crampton, Jason Univ London Informat Secur Grp London WC1E 7HU England
Hierarchical access control policies, in which users and objects are associated with nodes in a hierarchy, can be enforced using cryptographic mechanisms. Protected data is encrypted and authorized users are given the... 详细信息
来源: 评论