层次结构中时间令牌约束的灵活密钥分配

Hsing-Chung Chen, Shiuh-Jeng Wang, J. Wen, Chung-Wei Chen
{"title":"层次结构中时间令牌约束的灵活密钥分配","authors":"Hsing-Chung Chen, Shiuh-Jeng Wang, J. Wen, Chung-Wei Chen","doi":"10.1109/MUE.2008.75","DOIUrl":null,"url":null,"abstract":"A scheme, which uses flexible key management upon time-token constraint for a user hierarchy access control (UHAC) scheme, is proposed in this paper. For adapting the changeability in a UHAC system, we propose a technique of assigning independent time-token which is distributed by a trusted agency server to reply an authorized user for once secure access request. The key feature of the technique is to adapt some secure parameters in distributed time-token for responding to each legal access request. Further, all class keys will be updated proactively by the concept of proactive key management, which makes the advantage that is proven and free from the scenario of the collusive attack example which proposed by Yi et al. (2003).","PeriodicalId":203066,"journal":{"name":"2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Flexible Key Assignment for a Time-Token Constraint in a Hierarchy\",\"authors\":\"Hsing-Chung Chen, Shiuh-Jeng Wang, J. Wen, Chung-Wei Chen\",\"doi\":\"10.1109/MUE.2008.75\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A scheme, which uses flexible key management upon time-token constraint for a user hierarchy access control (UHAC) scheme, is proposed in this paper. For adapting the changeability in a UHAC system, we propose a technique of assigning independent time-token which is distributed by a trusted agency server to reply an authorized user for once secure access request. The key feature of the technique is to adapt some secure parameters in distributed time-token for responding to each legal access request. Further, all class keys will be updated proactively by the concept of proactive key management, which makes the advantage that is proven and free from the scenario of the collusive attack example which proposed by Yi et al. (2003).\",\"PeriodicalId\":203066,\"journal\":{\"name\":\"2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-04-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/MUE.2008.75\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MUE.2008.75","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

摘要

提出了一种基于时间令牌约束的灵活密钥管理的用户层次访问控制(UHAC)方案。为了适应UHAC系统的可变性,我们提出了一种分配独立时间令牌的技术,该时间令牌由可信代理服务器分发,以响应授权用户的一次安全访问请求。该技术的关键特点是在分布式时间令牌中调整一些安全参数来响应每个合法的访问请求。此外,所有类密钥都将通过主动密钥管理的概念进行主动更新,这使得其优势得到了证明,并且不受Yi等人(2003)提出的合谋攻击示例的影响。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Flexible Key Assignment for a Time-Token Constraint in a Hierarchy
A scheme, which uses flexible key management upon time-token constraint for a user hierarchy access control (UHAC) scheme, is proposed in this paper. For adapting the changeability in a UHAC system, we propose a technique of assigning independent time-token which is distributed by a trusted agency server to reply an authorized user for once secure access request. The key feature of the technique is to adapt some secure parameters in distributed time-token for responding to each legal access request. Further, all class keys will be updated proactively by the concept of proactive key management, which makes the advantage that is proven and free from the scenario of the collusive attack example which proposed by Yi et al. (2003).
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信