{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T18:29:14Z","timestamp":1725474554905},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540689621"},{"type":"electronic","value":"9783540689638"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11961635_14","type":"book-chapter","created":{"date-parts":[[2006,11,27]],"date-time":"2006-11-27T18:56:45Z","timestamp":1164653805000},"page":"205-219","source":"Crossref","is-referenced-by-count":1,"title":["An Efficient Key Assignment Scheme for Access Control in a Hierarchy"],"prefix":"10.1007","author":[{"given":"Praveen Kumar","family":"Vadnala","sequence":"first","affiliation":[]},{"given":"Anish","family":"Mathuria","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"14_CR1","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1145\/357369.357372","volume":"1","author":"S. Akl","year":"1983","unstructured":"Akl, S., Taylor, P.: Cryptographic solution to a problem of access control in a hierarchy. J-TOCS\u00a01(3), 239\u2013248 (1983)","journal-title":"J-TOCS"},{"issue":"2","key":"14_CR2","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/0020-0190(88)90099-3","volume":"27","author":"R. Sandhu","year":"1988","unstructured":"Sandhu, R.: Cryptographic implementation of a tree hierarchy for access control. Information Processing Letters\u00a027(2), 95\u201398 (1988)","journal-title":"Information Processing Letters"},{"issue":"6","key":"14_CR3","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1016\/0167-4048(90)90132-D","volume":"9","author":"L. Harn","year":"1990","unstructured":"Harn, L., Lin, H.: Cryptographic key generation scheme for multilevel data security. Computers and Security\u00a09(6), 539\u2013546 (1990)","journal-title":"Computers and Security"},{"issue":"2","key":"14_CR4","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1016\/S0167-4048(02)00211-0","volume":"21","author":"V.R.L. Shen","year":"2002","unstructured":"Shen, V.R.L., Chen, T.S.: A novel key management scheme based on discrete logarithms and polynomial interpolations. Computers and Security\u00a021(2), 164\u2013171 (2002)","journal-title":"Computers and Security"},{"key":"14_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/11693383_15","volume-title":"Selected Areas in Cryptography","author":"J. Wu","year":"2006","unstructured":"Wu, J., Wei, R.: An access control scheme for partial ordered set hierarchy with provable security. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol.\u00a03897, pp. 221\u2013232. Springer, Heidelberg (2006)"},{"issue":"8","key":"14_CR6","doi-asserted-by":"publisher","first-page":"659","DOI":"10.1016\/j.cose.2004.08.004","volume":"23","author":"C. Yang","year":"2004","unstructured":"Yang, C., Li, C.: Access control in a hierarchy using one-way hash functions. Computers and Security\u00a023(8), 659\u2013664 (2004)","journal-title":"Computers and Security"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Atallah, M., Frikken, K., Blanton, M.: Dynamic and efficient key management for access hierarchies. In: ACM Conference on Computer and Communications Security (CCS 2005), pp. 190\u2013202 (2005)","DOI":"10.1145\/1102120.1102147"},{"issue":"5","key":"14_CR8","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1016\/S0167-4048(03)00514-5","volume":"22","author":"C.L. Hsu","year":"2003","unstructured":"Hsu, C.L., Wu, T.S.: Cryptanalyses and improvements of two cryptographic key assignment schemes for dynamic access control in a user hierarchy. Computers and Security\u00a022(5), 453\u2013456 (2003)","journal-title":"Computers and Security"},{"key":"14_CR9","volume-title":"Introduction to Algorithms","author":"T. Cormen","year":"2001","unstructured":"Cormen, T., Leiserson, C., Rivest, R., Stein, C.: Introduction to Algorithms, 2nd edn. MIT Press, Cambridge (2001)","edition":"2"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11961635_14.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:22:17Z","timestamp":1619508137000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11961635_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540689621","9783540689638"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/11961635_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}