English  |  正體中文  |  简体中文  |  Items with full text/Total items : 90429/105609 (86%)
Visitors : 10541288      Online Users : 284
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    ASIA unversity > 資訊學院 > 資訊工程學系 > 期刊論文 >  Item 310904400/18602

    Please use this identifier to cite or link to this item: http://asiair.asia.edu.tw/ir/handle/310904400/18602

    Title: A Cryptographic Key Assignment Scheme with Adaptable Time-token Constraint in a Hierarchy , vol.3, no.4, pp. 1–16, October 2008.
    Authors: 陳興忠;Chen, Hsing-Chung
    Contributors: 資訊工程學系
    Keywords: key assignment;proactive key management;access control;adaptable time-token
    Date: 2008-10
    Issue Date: 2012-11-26 13:55:49 (UTC+8)
    Abstract: A scheme, which uses flexible cryptographic key management upon adaptable time-token
    constraint for a user hierarchy access control (UHAC) scheme, is proposed in this paper. For
    adapting the changeability in a UHAC system, we propose a technique of assigning
    independent time-token which is distributed by a trusted agency server to reply an authorized
    user for once secure access request. The key feature of the technique is to adapt some secure
    parameters in distributed time-token for responding to each legal access request. Further, all
    class keys will be updated proactively by the concept of proactive key management, which
    makes the advantage that is proven and free from the scenario of the collusive attack example
    which proposed by Yi et al. in [18]. This cryptographic key assignment scheme based on the
    difficulty in solving a discrete logarithm, with adaptable time-token constraint, can achieve
    better security and more efficient management, than the conventional UHAC scheme.
    Besides, our scheme provides a flexible manner and dynamic key management to increase the
    availability of user access in UHAC structure
    Relation: International Journal of Multimedia and Ubiquitous Engineering
    Appears in Collections:[資訊工程學系] 期刊論文

    Files in This Item:

    File Description SizeFormat

    All items in ASIAIR are protected by copyright, with all rights reserved.

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback