The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.09 - September (1985 vol.34)
pp: 797-802
S.J. Mackinnon , Thousand Island Secondary School, Brockville, Ont., Canada, and the Department of Mathematics and Statistics, Queen's University
ABSTRACT
A cryptographic scheme for controlling access to information within a group of users organized in a hierarchy was proposed in [1]. The scheme enables a user at some level to compute from his own cryptographic key the keys of the users below him in the organization.
INDEX TERMS
partially ordered set, Access control, canonical assignment, cooperative attack, cryptographic key, hierarchy, key generation algorithm
CITATION
S.J. Mackinnon, P.D. Taylor, H. Meijer, S.G. Akl, "An Optimal Algorithm for Assigning Cryptographic Keys to Control Access in a Hierarchy", IEEE Transactions on Computers, vol.34, no. 9, pp. 797-802, September 1985, doi:10.1109/TC.1985.1676635
42 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool