A comprehensive survey of cryptography key management systems

S Rana, FK Parast, B Kelly, Y Wang, KB Kent - Journal of Information …, 2023 - Elsevier
Cryptographic methods have been extensively employed in various systems to address
security objectives, such as data confidentiality, authentication, and secure communication …

Key-aggregate cryptosystem for scalable data sharing in cloud storage

CK Chu, SSM Chow, WG Tzeng… - IEEE transactions on …, 2013 - ieeexplore.ieee.org
Data sharing is an important functionality in cloud storage. In this paper, we show how to
securely, efficiently, and flexibly share data with others in cloud storage. We describe new …

Dynamic and efficient key management for access hierarchies

MJ Atallah, M Blanton, N Fazio, KB Frikken - ACM Transactions on …, 2009 - dl.acm.org
Hierarchies arise in the context of access control whenever the user population can be
modeled as a set of partially ordered classes (represented as a directed graph). A user with …

Key-aggregate authentication cryptosystem for data sharing in dynamic cloud storage

C Guo, N Luo, MZA Bhuiyan, Y Jie, Y Chen… - Future Generation …, 2018 - Elsevier
Sharing encrypted data with different users via public cloud storage is an important
functionality. Therefore, we propose a key-aggregate authentication cryptosystem that can …

Key management for multiple multicast groups in wireless networks

MH Park, YH Park, HY Jeong… - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
With the emergence of diverse group-based services, multiple multicast groups are likely to
coexist in a single network, and users may subscribe to multiple groups simultaneously …

A secure key-aggregate authentication cryptosystem for data sharing in dynamic cloud storage

K Alimohammadi, M Bayat, HHS Javadi - Multimedia Tools and …, 2020 - Springer
The ability of data owner in secure and efficient arbitrary data sharing with others is of great
importance in the outsourced encrypted data on the cloud. To protect data confidentiality …

Decentralized access control for secure microservices cooperation with blockchain

N Xi, J Liu, Y Li, B Qin - ISA transactions, 2023 - Elsevier
With the rapid advancement of cloud-native computing, the microservice with high
concurrency and low coupling has ushered in an unprecedented period of vigorous …

Survey of security services on group communications

P Sakarindr, N Ansari - IET information security, 2010 - IET
Secure group communication (SGC) has attracted much attention, as group-oriented
communications have been increasingly facilitating many emerging applications that require …

[PDF][PDF] 基于Diffie-Hellman 算法的分层密钥分配方案

阎军智, 李凤华, 马建峰 - 电子学报, 2011 - ejournal.org.cn
在基于内容的访问控制系统中, 主体对客体只有允许访问和拒绝访问两种权限,
且主体之间和客体之间都存在一种偏序关系, 传统的访问控制策略需要对主客体单独进行管理 …

Blockchain based data access control using smart contracts

A Kiran, S Dharanikota, A Basava - TENCON 2019-2019 IEEE …, 2019 - ieeexplore.ieee.org
The keystone of information security has been access control. Very often, User data is
misused and users are oblivious to the use of their data by unauthorized parties. Current …