{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T18:53:33Z","timestamp":1743015213177,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319077758"},{"type":"electronic","value":"9783319077765"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07776-5_4","type":"book-chapter","created":{"date-parts":[[2014,5,26]],"date-time":"2014-05-26T14:36:47Z","timestamp":1401115007000},"page":"31-38","source":"Crossref","is-referenced-by-count":5,"title":["Towards Time-Bound Hierarchical Key Management in Cloud Computing"],"prefix":"10.1007","author":[{"given":"Tsu-Yang","family":"Wu","sequence":"first","affiliation":[]},{"given":"Chengxiang","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Eric Ke","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jeng-Shyang","family":"Pan","sequence":"additional","affiliation":[]},{"given":"Chien-Ming","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"6","key":"4_CR1","doi-asserted-by":"publisher","first-page":"903","DOI":"10.1109\/TDSC.2012.49","volume":"9","author":"Y. Tang","year":"2012","unstructured":"Tang, Y., Lee, P., Lui, J., Perlman, R.: Secure overlay cloud storage with access control and assured deletion. IEEE Transactions on Dependable and Secure Computing\u00a09(6), 903\u2013916 (2012)","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"4_CR2","first-page":"2625","volume-title":"IEEE INFOCOM","author":"T. Jung","year":"2013","unstructured":"Jung, T., Li, X.Y., Wan, Z., Wan, M.: Privacy preserving cloud data access with multi-authorities. In: IEEE INFOCOM, pp. 2625\u20132633. IEEE Press, New York (2013)"},{"issue":"2","key":"4_CR3","doi-asserted-by":"publisher","first-page":"468","DOI":"10.1109\/TPDS.2013.112","volume":"25","author":"C.K. Chu","year":"2014","unstructured":"Chu, C.K., Chow, S.S.M., Tzeng, W.G., Zhou, J., Deng, R.H.: Key-aggregate cryptosystem for scalable data sharing in cloud storage. IEEE Transactions on Parallel and Distributed Systems\u00a025(2), 468\u2013477 (2014)","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"issue":"3","key":"4_CR4","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1145\/357369.357372","volume":"1","author":"S.G. Akl","year":"1983","unstructured":"Akl, S.G., Taylor, P.D.: Cryptographic solution to a problem of access control in a hierarchy. ACM Transactions on Computer Systems\u00a01(3), 239\u2013248 (1983)","journal-title":"ACM Transactions on Computer Systems"},{"issue":"1","key":"4_CR5","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1109\/TCE.2004.1277866","volume":"50","author":"T. Jiang","year":"2004","unstructured":"Jiang, T., Zheng, S., Liu, B.: Key distribution based on hierarchical access control for conditional access system in DTV broadcast. IEEE Transactions on Consumer Electronics\u00a050(1), 225\u2013230 (2004)","journal-title":"IEEE Transactions on Consumer Electronics"},{"key":"4_CR6","first-page":"190","volume-title":"12th ACM Conference on Computer and Communications Security","author":"M.J. Atallah","year":"2005","unstructured":"Atallah, M.J., Blanton, M., Fazio, N., Frikken, K.B.: Dynamic and efficient key management for access hierarchies. In: 12th ACM Conference on Computer and Communications Security, pp. 190\u2013201. ACM Press, New York (2005)"},{"key":"4_CR7","first-page":"531","volume-title":"21st International Conference on Advanced Information Networking and Applications Workshops","author":"A.V.D.M. Kayem","year":"2007","unstructured":"Kayem, A.V.D.M., Martin, P., Akl, S.G.: Heuristics for improving cryptographic key assignment in a hierarchy. In: 21st International Conference on Advanced Information Networking and Applications Workshops, pp. 531\u2013536. IEEE Press, New York (2007)"},{"issue":"1","key":"4_CR8","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1109\/69.979981","volume":"14","author":"W.G. Tzeng","year":"2002","unstructured":"Tzeng, W.G.: A time-bound cryptographic key assignment scheme for access control in hierarchy. IEEE Transactions on Knowledge and Data Engineering\u00a014(1), 182\u2013188 (2002)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"4","key":"4_CR9","doi-asserted-by":"publisher","first-page":"1054","DOI":"10.1109\/TKDE.2003.1209023","volume":"15","author":"X. Yi","year":"2003","unstructured":"Yi, X., Ye, Y.: Security of Tzeng\u2019s time-bound key assignment scheme access control in a hierarchy. IEEE Transactions on Knowledge and Data Engineering\u00a015(4), 1054\u20131055 (2003)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"10","key":"4_CR10","doi-asserted-by":"publisher","first-page":"1301","DOI":"10.1109\/TKDE.2004.59","volume":"16","author":"H.Y. Chien","year":"2004","unstructured":"Chien, H.Y.: Efficient time-bound hierarchical key assignment scheme. IEEE Transactions on Knowledge and Data Engineering\u00a016(10), 1301\u20131304 (2004)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"9","key":"4_CR11","doi-asserted-by":"publisher","first-page":"1298","DOI":"10.1109\/TKDE.2005.152","volume":"17","author":"X. Yi","year":"2005","unstructured":"Yi, X.: Security of Chien\u2019s efficient time-bound hierarchical key assignment scheme. IEEE Transactions on Knowledge and Data Engineering\u00a017(9), 1298\u20131299 (2005)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"4_CR12","first-page":"285","volume-title":"14th ACM International Conference on Information and Knowledge Management","author":"J.H. Yeh","year":"2005","unstructured":"Yeh, J.H.: An RSA-based time-bound hierarchical key assignment scheme for electronic article subscription. In: 14th ACM International Conference on Information and Knowledge Management, pp. 285\u2013286. ACM Press, New York (2005)"},{"issue":"1","key":"4_CR13","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1109\/TDSC.2006.15","volume":"3","author":"S.Y. Wang","year":"2006","unstructured":"Wang, S.Y., Lih, C.S.: Merging: an efficient solution for a time-bound hierarchical key assignment scheme. IEEE Transactions on Dependable and Secure Computing\u00a03(1), 91\u2013100 (2006)","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"4_CR14","first-page":"288","volume-title":"13th ACM Conference on Computer and Communications Security","author":"G. Ateniese","year":"2006","unstructured":"Ateniese, G., Santis, A.D., Ferrara, A.L., Masucci, B.: Provably-secure time-bound hierarchical key assignment schemes. In: 13th ACM Conference on Computer and Communications Security, pp. 288\u2013297. ACM Press, New York (2006)"},{"key":"4_CR15","first-page":"279","volume-title":"5th International Conference on Mobile Ad-hoc and Sensor Networks","author":"Y. Sui","year":"2009","unstructured":"Sui, Y., Maino, F., Guo, Y., Wang, K., Zou, X.: An efficient time-bound access control scheme for dynamic access hierarchy. In: 5th International Conference on Mobile Ad-hoc and Sensor Networks, pp. 279\u2013286. IEEE Press, New York (2009)"},{"key":"4_CR16","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1109\/CMCSN.2012.69","volume-title":"1st International Conference on Computing, Measurement, Control and Sensor Network","author":"C.M. Chen","year":"2012","unstructured":"Chen, C.M., Wu, T.Y., He, B.Z., Sun, H.M.: An efficient time-bound hierarchical key management scheme without tamper-resistant devices. In: 1st International Conference on Computing, Measurement, Control and Sensor Network, pp. 285\u2013288. IEEE Press, New York (2012)"},{"issue":"2","key":"4_CR17","doi-asserted-by":"publisher","first-page":"173","DOI":"10.5755\/j01.itc.41.2.846","volume":"41","author":"Y.M. Tseng","year":"2012","unstructured":"Tseng, Y.M., Yu, C.H., Wu, T.Y.: Towards scalable key management for secure multicast communication. Information Technology and Control\u00a041(2), 173\u2013182 (2012)","journal-title":"Information Technology and Control"},{"key":"4_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/978-3-642-38980-1_3","volume-title":"Applied Cryptography and Network Security","author":"Y.-R. Chen","year":"2013","unstructured":"Chen, Y.-R., Chu, C.-K., Tzeng, W.-G., Zhou, J.: CloudHKA: a cryptography approach for hierarchical access control in cloud computing. In: Jacobson, M., Locasto, M., Mohassel, P., Safavi-Naini, R. (eds.) ACNS 2013. LNCS, vol.\u00a07954, pp. 37\u201352. Springer, Heidelberg (2013)"},{"key":"4_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"D. Boneh","year":"2001","unstructured":"Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 213\u2013229. Springer, Heidelberg (2001)"},{"issue":"4","key":"4_CR20","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/s10207-006-0011-9","volume":"6","author":"L. Chen","year":"2007","unstructured":"Chen, L., Cheng, Z., Smart, N.P.: Identity-based key agreement protocols from pairings. International Journal of Information Security\u00a06(4), 213\u2013241 (2007)","journal-title":"International Journal of Information Security"},{"issue":"7","key":"4_CR21","doi-asserted-by":"publisher","first-page":"1062","DOI":"10.1093\/comjnl\/bxp083","volume":"53","author":"T.Y. Wu","year":"2010","unstructured":"Wu, T.Y., Tseng, Y.M.: An ID-based mutual authentication and key exchange protocol for low-power mobile devices. The Computer Journal\u00a053(7), 1062\u20131070 (2010)","journal-title":"The Computer Journal"},{"issue":"9","key":"4_CR22","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/35.312842","volume":"32","author":"R.S. Sandhu","year":"1994","unstructured":"Sandhu, R.S., Samarati, P.: Access control: principle and practice. IEEE Communications Magazine\u00a032(9), 40\u201348 (1994)","journal-title":"IEEE Communications Magazine"},{"key":"4_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1007\/BFb0052348","volume-title":"Fast Software Encryption","author":"R.L. Rivest","year":"1997","unstructured":"Rivest, R.L.: All-or-nothing encryption and the package transform. In: Biham, E. (ed.) FSE 1997. LNCS, vol.\u00a01267, pp. 210\u2013218. Springer, Heidelberg (1997)"},{"key":"4_CR24","unstructured":"Advanced Encryption Standard (AES), \n                      http:\/\/csrc.nist.gov\/publications\/fips\/fips197\/fips-197.pdf"}],"container-title":["Advances in Intelligent Systems and Computing","Intelligent Data analysis and its Applications, Volume I"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07776-5_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,23]],"date-time":"2023-01-23T19:38:55Z","timestamp":1674502735000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-07776-5_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319077758","9783319077765"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07776-5_4","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2014]]}}}