HIERARCHIC ACCESS CONTROL SYSTEM ON THE BASIS OF ELLIPTIC CRYPTOGRAPHY WITH SELF-ORGANIZATION


如何引用文章

全文:

详细

The paper presents a system to control access to confidential information transmitted over the network, based on elliptical cryptography. The system is focused on ad hoc networks. The proposed system is characterized by low hardware requirements and lack of main server. The paper presents the analysis of the proposed security access control.

全文:

ИЕРАРХИЧЕСКАЯ СИСТЕМА КОНТРОЛЯ ДОСТУПА К ИНФОРМАЦИИ НА БАЗЕ ЭЛЛИПТИЧЕСКОЙ КРИПТОГРАФИИ С САМООРГАНИЗАЦИЕЙ
×

参考

  1. Otto J.S., Bustamante F.E. Distributed or centralized traffic advisory systems - the application take // IEEE SECON, 2009. - P. 2226.
  2. Nafeesa B.J., Kumar K., Sumathy V Multilevel access control in a MANET for a defense messaging system using elliptic curve cryptography // International Journal of Computer Science & Security (IJCSS). V. 4, Issue 2, 2010. -P. 208-225.
  3. Campista M.E.M., Moraes I.M., Esposito P.M., Amodei A., Cunha D.O., Costa L.H., Duarte O.C. The ad hoc return channel: a low-cost solution for Brazilian interactive digital TV // IEEE Communication Magazine. 2007. - P. 136-143.
  4. Puri A., Chen T. Multimedia Systems, Standards, and Networks. Marcel Dekker Inc, 2000.
  5. Ростовцев А.Г., Маховенко Е.Б. Теоретическая криптография. СПб.: Изд. НПО «Профессионал», 2004. - 480 с.
  6. Akl S., Taylor P. Cryptographic solution to a problem of access control in a hierarchy // ACM Transactions on Computer Systems. V. 1(3), 1983. - P. 239-248.
  7. Chen S., Chung Y.-F., Tian C.-S. A novel key management scheme for dynamic access control in a user hierarchy // COMPSAC-2004. - P. 396397.
  8. Das M. L., Saxena A., Gulati V. P., Phatak D.B. Hierarchical key management scheme using polynomial interpolation // SIGOPS Operating Systems Review. V. 39(1), 2005. - P.40-47.
  9. Hwang M-S., Liu C-H., Lo J-W. An efficient key assignment for access control in large partially ordered hierarchy // Journal of Systems and Software. V. 73(3), 2004. - P. 507-514.
  10. Zhong S. A practical key management scheme for access control in a user hierarchy // Computers and Security. V. 21(8), 2002. - P.750-759.
  11. Zou X., Ramamurthy B., Magliveras S. Chinese remainder theorem based hierarchical access controlfor secure group communications.

补充文件

附件文件
动作
1. JATS XML

版权所有 © Afonin M.S., Gladkov A.V., Maslennikova E.V., Chervyakov N.I., 2012

Creative Commons License
此作品已接受知识共享署名-非商业性使用-禁止演绎 4.0国际许可协议的许可。

##common.cookie##