{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,14]],"date-time":"2025-07-14T02:28:33Z","timestamp":1752460113725},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642137389"},{"type":"electronic","value":"9783642137396"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-13739-6_9","type":"book-chapter","created":{"date-parts":[[2010,8,24]],"date-time":"2010-08-24T11:23:50Z","timestamp":1282649030000},"page":"130-145","source":"Crossref","is-referenced-by-count":8,"title":["Constructing Key Assignment Schemes from Chain Partitions"],"prefix":"10.1007","author":[{"given":"Jason","family":"Crampton","sequence":"first","affiliation":[]},{"given":"Rosli","family":"Daud","sequence":"additional","affiliation":[]},{"given":"Keith M.","family":"Martin","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"9_CR1","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1109\/76.911157","volume":"11","author":"W. Li","year":"2001","unstructured":"Li, W.: Overview of fine granularity scalability in MPEG-4 video standard. IEEE Transactions on Circuits and Systems for Video Technology\u00a011(3), 301\u2013317 (2001)","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"issue":"4","key":"9_CR2","doi-asserted-by":"publisher","first-page":"1103","DOI":"10.1109\/30.920468","volume":"46","author":"C. Christopoulos","year":"2000","unstructured":"Christopoulos, C., Skodras, A., Ebrahimi, T.: The JPEG2000 still image coding system: An overview. IEEE Transactions on Consumer Electronics\u00a046(4), 1103\u20131127 (2000)","journal-title":"IEEE Transactions on Consumer Electronics"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Zhu, B., Feng, S., Li, S.: An efficient key scheme for layered access control of MPEG-4 FGS video. In: Proceedings of the 2004 IEEE International Conference on Multimedia and Expo., vol.\u00a01, pp. 443\u2013446 (2004)","DOI":"10.1109\/ICME.2004.1394224"},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"Hashimoto, N., Imaizumi, S., Fujiyoshi, M., Kiya, H.: Hierarchical encryption using short encryption keys for scalable access control of JPEG 2000 coded images. In: Proceedings of the 2008 IEEE International Conference on Image Processing, pp. 3116\u20133119 (2008)","DOI":"10.1109\/ICIP.2008.4712455"},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Imaizumi, S., Fujiyoshi, M., Abe, Y., Kiya, H.: Collusion attack-resilient hierarchical encryption of JPEG 2000 codestreams with scalable access control. In: Proceedings of the 2007 IEEE International Conference on Image Processing, vol.\u00a02, pp. 137\u2013140 (2007)","DOI":"10.1109\/ICIP.2007.4379111"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Imaizumi, S., Watanabe, O., Fujiyoshi, M., Kiya, H.: Generalized hierarchical encryption of JPEG 2000 codestreams for access control. In: Proceedings of the 2005 IEEE International Conference on Image Processing, vol.\u00a02, pp. 1094\u20131097 (2005)","DOI":"10.1109\/ICIP.2005.1530250"},{"key":"9_CR7","unstructured":"Crampton, J., Daud, R., Martin, K.: Constructing key assignment schemes from chain partitions. Technical Report RHUL-MA-2010-10, Royal Holloway, University of London (2010), http:\/\/www.ma.rhul.ac.uk\/static\/techrep\/2010\/RHUL-MA-2010-10.pdf"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Crampton, J., Martin, K., Wild, P.: On key assignment for hierarchical access control. In: Proceedings of 19th Computer Security Foundations Workshop, pp. 98\u2013111 (2006)","DOI":"10.1109\/CSFW.2006.20"},{"key":"9_CR9","volume-title":"Introduction to Lattices and Order","author":"B. Davey","year":"1990","unstructured":"Davey, B., Priestley, H.: Introduction to Lattices and Order. Cambridge University Press, Cambridge (1990)"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Katz, J., Lindell, Y.: Introduction to Modern Cryptography. Chapman & Hall\/CRC (2007)","DOI":"10.1201\/9781420010756"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Bell, D., LaPadula, L.: Secure computer systems: Unified exposition and Multics interpretation. Technical Report MTR-2997, Mitre Corporation, Bedford, Massachusetts (1976)","DOI":"10.21236\/ADA023588"},{"issue":"5","key":"9_CR12","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1145\/360051.360056","volume":"19","author":"D. Denning","year":"1976","unstructured":"Denning, D.: A lattice model of secure information flow. Communications of the ACM\u00a019(5), 236\u2013243 (1976)","journal-title":"Communications of the ACM"},{"issue":"3","key":"9_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1455526.1455531","volume":"12","author":"M. Atallah","year":"2009","unstructured":"Atallah, M., Blanton, M., Fazio, N., Frikken, K.: Dynamic and efficient key management for access hierarchies. ACM Transactions on Information and System Security\u00a012(3), 1\u201343 (2009)","journal-title":"ACM Transactions on Information and System Security"},{"key":"9_CR14","doi-asserted-by":"publisher","first-page":"161","DOI":"10.2307\/1969503","volume":"51","author":"R. Dilworth","year":"1950","unstructured":"Dilworth, R.: A decomposition theorem for partially ordered sets. Annals of Mathematics\u00a051, 161\u2013166 (1950)","journal-title":"Annals of Mathematics"},{"issue":"3","key":"9_CR15","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1145\/357369.357372","volume":"1","author":"S. Akl","year":"1983","unstructured":"Akl, S., Taylor, P.: Cryptographic solution to a problem of access control in a hierarchy. ACM Transactions on Computer Systems\u00a01(3), 239\u2013248 (1983)","journal-title":"ACM Transactions on Computer Systems"},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"Atallah, M., Blanton, M., Frikken, K.: Key management for non-tree access hierarchies. In: Proceedings of 11th ACM Symposium on Access Control Models and Technologies, pp. 11\u201318 (2006)","DOI":"10.1145\/1133058.1133062"},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"Atallah, M., Blanton, M., Frikken, K.: Efficient techniques for realizing geo-spatial access control. In: Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, pp. 82\u201392 (2007)","DOI":"10.1145\/1229285.1229301"}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security and Privacy XXIV"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-13739-6_9.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:42:39Z","timestamp":1606185759000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-13739-6_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642137389","9783642137396"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-13739-6_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}