{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T04:25:52Z","timestamp":1745987152505,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642371189"},{"type":"electronic","value":"9783642371196"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-37119-6_5","type":"book-chapter","created":{"date-parts":[[2013,3,27]],"date-time":"2013-03-27T00:34:59Z","timestamp":1364344499000},"page":"62-77","source":"Crossref","is-referenced-by-count":0,"title":["A Generic Algebraic Model for the Analysis of Cryptographic-Key Assignment Schemes"],"prefix":"10.1007","author":[{"given":"Khair Eddin","family":"Sabri","sequence":"first","affiliation":[]},{"given":"Ridha","family":"Khedri","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"5_CR1","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1145\/357369.357372","volume":"1","author":"S. Akl","year":"1983","unstructured":"Akl, S., Taylor, P.: Cryptographic solution to a problem of access control in a hierarchy. ACM Transaction on Computer Systems\u00a01(3), 239\u2013248 (1983)","journal-title":"ACM Transaction on Computer Systems"},{"issue":"3","key":"5_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1455526.1455531","volume":"12","author":"M.J. Atallah","year":"2009","unstructured":"Atallah, M.J., Blanton, M., Fazio, N., Frikken, K.B.: Dynamic and efficient key management for access hierarchies. ACM Transactions on Information and System Security\u00a012(3), 1\u201343 (2009)","journal-title":"ACM Transactions on Information and System Security"},{"key":"5_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1007\/3-540-45961-8_40","volume-title":"Advances in Cryptology - EUROCRYPT \u201988","author":"C. Boyd","year":"1988","unstructured":"Boyd, C.: Some Applications of Multiple Key Ciphers. In: G\u00fcnther, C.G. (ed.) EUROCRYPT 1988. LNCS, vol.\u00a0330, pp. 455\u2013467. Springer, Heidelberg (1988)"},{"issue":"6","key":"5_CR4","doi-asserted-by":"publisher","first-page":"523","DOI":"10.1016\/S0167-4048(03)00613-8","volume":"22","author":"H.-Y. Chien","year":"2003","unstructured":"Chien, H.-Y., Jan, J.-K.: New hierarchical assignment without public key cryptography. Computers & Security\u00a022(6), 523\u2013526 (2003)","journal-title":"Computers & Security"},{"issue":"6","key":"5_CR5","doi-asserted-by":"publisher","first-page":"565","DOI":"10.1016\/S0167-4048(02)01016-7","volume":"21","author":"T.-S. Chen","year":"2002","unstructured":"Chen, T.-S., Chung, Y.-F.: Hierarchical access control based on Chinese remainder theorem and symmetric algorithm. Computers & Security\u00a021(6), 565\u2013570 (2002)","journal-title":"Computers & Security"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Crampton, J., Martin, K., Wild, P.: On key assignment for hierarchical access control. In: Proceedings of the 19th IEEE workshop on Computer Security Foundations (CSFW 2006), Venice, Italy, pp. 98\u2013111. IEEE Computer Society (2006)","DOI":"10.1109\/CSFW.2006.20"},{"issue":"6","key":"5_CR7","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1016\/0167-4048(90)90132-D","volume":"9","author":"L. Harn","year":"1990","unstructured":"Harn, L., Lin, H.-Y.: A cryptographic key generation scheme for multilevel data security. Computer Security\u00a09(6), 539\u2013546 (1990)","journal-title":"Computer Security"},{"key":"5_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1007\/11813040_21","volume-title":"FM 2006: Formal Methods","author":"P. H\u00f6fner","year":"2006","unstructured":"H\u00f6fner, P., Khedri, R., M\u00f6ller, B.: Feature Algebra. In: Misra, J., Nipkow, T., Sekerinski, E. (eds.) FM 2006. LNCS, vol.\u00a04085, pp. 300\u2013315. Springer, Heidelberg (2006)"},{"issue":"5","key":"5_CR9","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1049\/ip-cdt:19990311","volume":"146","author":"F.H. Kuo","year":"1999","unstructured":"Kuo, F.H., Shen, V.R.L., Chen, T.S., Lai, F.: Cryptographic key assignment scheme for dynamic access control in a user hierarchy. IEEE Proceedings Computers and Digital Techniques\u00a0146(5), 235\u2013240 (1999)","journal-title":"IEEE Proceedings Computers and Digital Techniques"},{"issue":"6","key":"5_CR10","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/0898-1221(93)90305-F","volume":"25","author":"H.T. Liaw","year":"1993","unstructured":"Liaw, H.T., Wang, S.J., Lei, C.L.: A dynamic cryptographic key assignment scheme in a tree structure. Computers & Mathematics with Applications\u00a025(6), 109\u2013114 (1993)","journal-title":"Computers & Mathematics with Applications"},{"issue":"9","key":"5_CR11","doi-asserted-by":"publisher","first-page":"797","DOI":"10.1109\/TC.1985.1676635","volume":"34","author":"S.J. MacKinnon","year":"1985","unstructured":"MacKinnon, S.J., Taylor, P.D., Meijer, H., Akl, S.G.: An optimal algorithm for assigning cryptographic keys to control access in a hierarchy. IEEE Transactions on Computers\u00a034(9), 797\u2013802 (1985)","journal-title":"IEEE Transactions on Computers"},{"key":"5_CR12","unstructured":"McCune, W.: Prover9 and Mace4, http:\/\/www.cs.unm.edu\/~mccune\/prover9\/"},{"key":"5_CR13","unstructured":"Rabin, M.: Digitalized signatures and public-key functions as intractable as factorization. Technical Report MIT\/LCS\/TR-212, MIT Laboratory for Computer Science (1979)"},{"key":"5_CR14","unstructured":"Sabri, K.E.: Algebraic Framework for the Verification of Confidentiality Properties. PhD thesis, McMaster University (2010)"},{"issue":"4","key":"5_CR15","doi-asserted-by":"crossref","first-page":"305","DOI":"10.3233\/FI-2011-592","volume":"112","author":"K.E. Sabri","year":"2011","unstructured":"Sabri, K.E., Khedri, R.: Algebraic framework for the specification and analysis of cryptographic-key distribution. Fundamenta Informaticae\u00a0112(4), 305\u2013335 (2011)","journal-title":"Fundamenta Informaticae"},{"key":"5_CR16","first-page":"405","volume-title":"ACM 1987: Proceedings of the 1987 Fall Joint Computer Conference on Exploring Technology: Today and Tomorrow","author":"R.S. Sandhu","year":"1987","unstructured":"Sandhu, R.S.: On some cryptographic solutions for access control in a tree hierarchy. In: ACM 1987: Proceedings of the 1987 Fall Joint Computer Conference on Exploring Technology: Today and Tomorrow, pp. 405\u2013410. IEEE Computer Society Press, Los Alamitos (1987)"},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"Yan, S.Y.: Number theory for computing. Springer (2002)","DOI":"10.1007\/978-3-662-04773-6"},{"issue":"5","key":"5_CR18","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1016\/S0167-4048(03)00513-3","volume":"22","author":"S. Zhong","year":"2003","unstructured":"Zhong, S., Lin, T.: A comment on the chen-chung scheme for hierarchical access control. Computers & Security\u00a022(5), 450\u2013452 (2003)","journal-title":"Computers & Security"}],"container-title":["Lecture Notes in Computer Science","Foundations and Practice of Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-37119-6_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T02:13:07Z","timestamp":1745979187000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-37119-6_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642371189","9783642371196"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-37119-6_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}