A centralized key management scheme for hierarchical access control

Q Zhang, Y Wang - IEEE Global Telecommunications …, 2004 - ieeexplore.ieee.org
Key management schemes are used to provide access control to data streams for legitimate
users. The users often have certain partially ordered relations, while data streams also form
some partially ordered relations. Previous key management schemes have failed to take into
consideration either the user relations or data stream relations. We propose a centralized
key management scheme for hierarchical access control that considers both partially
ordered users and partially ordered data streams. Our scheme improves the efficiency of key …

[引用][C] A centralized key management scheme for hierarchical access control. Global Telecommunications Conference (GLOBECOM'04)

Q Zhang, Y Wang - 2004 - IEEE
以上显示的是最相近的搜索结果。 查看全部搜索结果