{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T16:38:01Z","timestamp":1742402281124},"reference-count":27,"publisher":"Elsevier BV","issue":"7","license":[{"start":{"date-parts":[[2001,10,1]],"date-time":"2001-10-01T00:00:00Z","timestamp":1001894400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers &amp; Security"],"published-print":{"date-parts":[[2001,10]]},"DOI":"10.1016\/s0167-4048(01)00711-8","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T09:46:56Z","timestamp":1027590416000},"page":"612-619","source":"Crossref","is-referenced-by-count":30,"title":["Hierarchical key assignment without public-key cryptography"],"prefix":"10.1016","volume":"20","author":[{"given":"Chu-Hsing","family":"Lin","sequence":"first","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0167-4048(01)00711-8_BIB1","doi-asserted-by":"crossref","unstructured":"D. E. Denning, S. G. Akl, M. Morgenstern and P.G. Nermann, Views for multilevel database security, Proc. IEEE Symp. on Security and Privacy, Oakland. CA. April 7\u20139, 1986, pp.156\u2013172.","DOI":"10.1109\/SP.1986.10012"},{"key":"10.1016\/S0167-4048(01)00711-8_BIB2","doi-asserted-by":"crossref","unstructured":"D. E. Denning, Cryptographic checksums for multilevel database security, Proc. IEEE Symp. on Security and Privacy, Oakland, CA, April 29\u2013May 2, 1984, pp.52\u201361.","DOI":"10.1109\/SP.1984.10011"},{"key":"10.1016\/S0167-4048(01)00711-8_BIB3","doi-asserted-by":"crossref","unstructured":"G. I. Davida, D. L. Wells and J. B. Kam, A database encryption system with subkeys, ACM Trans. Database systems, 6(2), June 1981, pp.312\u2013328.","DOI":"10.1145\/319566.319580"},{"key":"10.1016\/S0167-4048(01)00711-8_BIB4","doi-asserted-by":"crossref","unstructured":"J. McHugh and A. P. Moore, A security policy and formal top level specification for a multilevel secure local area network, Proc. IEEE Symp. on Security and Privacy, Oakland, CA, April 7\u20139, 1986, pp.34\u201339.","DOI":"10.1109\/SP.1986.10017"},{"key":"10.1016\/S0167-4048(01)00711-8_BIB5","doi-asserted-by":"crossref","unstructured":"D. McCullough, Specifications for multilevel security and a hook-up property, Proc. IEEE Symp. on Security and Privacy, Oakland, CA, April 27\u201329, 1987, pp.161\u2013166.","DOI":"10.1109\/SP.1987.10009"},{"key":"10.1016\/S0167-4048(01)00711-8_BIB6","doi-asserted-by":"crossref","unstructured":"L. J. Fraim, Scomp: a solution to multilevel security problem, IEEE Computer, July 1983, pp.26\u201334.","DOI":"10.1109\/MC.1983.1654440"},{"key":"10.1016\/S0167-4048(01)00711-8_BIB7","doi-asserted-by":"crossref","unstructured":"S. G. Akl and P. D. Taylor, Cryptographic solution to a problem of access control in a hierarchy, ACM Trans. on Computer System, 1(3), August 1983, pp. 239\u2013247.","DOI":"10.1145\/357369.357372"},{"key":"10.1016\/S0167-4048(01)00711-8_BIB8","doi-asserted-by":"crossref","unstructured":"S. T. Mackinnon, P. D. Taylor, H. Meijer and S. G. Akl, An optimal algorithm for assigning cryptographic keys to control access in a hierarchy, IEEE Trans. Computers, C-34(9), 1985, pp.797\u2013802.","DOI":"10.1109\/TC.1985.1676635"},{"key":"10.1016\/S0167-4048(01)00711-8_BIB9","doi-asserted-by":"crossref","unstructured":"L. Harn and H.Y. Lin, A cryptographic keys generation scheme for multilevel data security, Computer Security, 9(1990), pp.539\u2013546.","DOI":"10.1016\/0167-4048(90)90132-D"},{"key":"10.1016\/S0167-4048(01)00711-8_BIB10","doi-asserted-by":"crossref","unstructured":"R. S. Sandhu, Cryptographic implementation of a tree hierarchy for access control, Information Processing Letters, 27(1988), pp.95\u201398.","DOI":"10.1016\/0020-0190(88)90099-3"},{"key":"10.1016\/S0167-4048(01)00711-8_BIB11","doi-asserted-by":"crossref","unstructured":"C. C. Chang, R. J. Hwang and T. C. Wu, Cryptographic key assignment scheme for access control in a hierarchy, Information Systems, 17(3), 1992, pp.243\u2013247.","DOI":"10.1016\/0306-4379(92)90015-F"},{"key":"10.1016\/S0167-4048(01)00711-8_BIB12","doi-asserted-by":"crossref","unstructured":"C. C. Chang and D. J. Buehrer, Access control in a hierarchy using a one-way trapdoor function Computers and Mathematics with Applications 26(5), 1993, pp.71\u201376.","DOI":"10.1016\/0898-1221(93)90075-7"},{"key":"10.1016\/S0167-4048(01)00711-8_BIB13","unstructured":"H. T. Liaw and M. Y. Chiou, Dynamic cryptographic key assignment schemes in a hierarchy, Proceedings of the fifth National Conference on Information Security, Taipei, Taiwan, May 1995, pp.88\u201399."},{"key":"10.1016\/S0167-4048(01)00711-8_BIB14","unstructured":"W. P. Lu and M. K. Sundareshan, A model for multilevel security in computer networks, Proceedings 1988 INFCOM, New Orleans, LA, March 1988, pp.1095-1104."},{"key":"10.1016\/S0167-4048(01)00711-8_BIB15","unstructured":"M. Maekawa, A. E. Oldehoeft and R. R. Oldehoeft, Operating Systems \u2014 Advanced Concepts, The Benjamin\/Cummings Publishing Company, Inc., Menlo Park, California, 1987."},{"key":"10.1016\/S0167-4048(01)00711-8_BIB16","unstructured":"K. Siil, Adaptive applications to multilevel secure UNIX systems, Proceedings 7th Int. Conf. and Exhibition on Information security, Brighton, UK., May 1991."},{"key":"10.1016\/S0167-4048(01)00711-8_BIB17","unstructured":"C. C. Chang, and H. T. Liaw, Assigning digital key pairs to determine relationships in a user hierarchy structure, Transactions of Information Processing Society of Japan, Vol. 35, No. 10, Oct. 1994, pp.2189\u20132196."},{"key":"10.1016\/S0167-4048(01)00711-8_BIB18","doi-asserted-by":"crossref","unstructured":"C. C. Chang, J. K. Jan, and D. J. Buehrer, A scheme to determine the relationship between two users in a hierarchy, Computers and Security, Vol.13, 1994, pp.255\u2013261.","DOI":"10.1016\/0167-4048(94)90079-5"},{"key":"10.1016\/S0167-4048(01)00711-8_BIB19","unstructured":"C. H. Lin, C. C. Chang, and R. C. T. Lee, A dynamic access control mechanism in information protection systems, Journal of Information Science and Engineering, Vol.6, 1990, pp.25\u201333."},{"key":"10.1016\/S0167-4048(01)00711-8_BIB20","doi-asserted-by":"crossref","unstructured":"C. H. Lin, C. C. Chang, and R.C.T. Lee, Hierarchy representations based on arithmetic coding for dynamic information protection systems, Information Sciences, Vol.64, No.1\u20132, Oct.1992, pp.35\u201348.","DOI":"10.1016\/0020-0255(92)90109-L"},{"key":"10.1016\/S0167-4048(01)00711-8_BIB21","unstructured":"G. Horng, A key management approach for access control in user hierarchies, Proceedings of International Computer Symposium, Hsinchu, Taiwan R.O.C., 1994, pp.439\u2013444."},{"key":"10.1016\/S0167-4048(01)00711-8_BIB22","doi-asserted-by":"crossref","unstructured":"H. M. Tsai and C. C. Chang, A cryptographic implementation for dynamic access control in a user hierarchy, Computer and Security, Vol.14, 1995, pp.159\u2013166.","DOI":"10.1016\/0167-4048(95)97049-G"},{"key":"10.1016\/S0167-4048(01)00711-8_BIB23","unstructured":"D. E. Denning, Cryptography and data security, Addison-Wesley, 1982."},{"key":"10.1016\/S0167-4048(01)00711-8_BIB24","doi-asserted-by":"crossref","unstructured":"T. Leighton and S. Micali, Secret-key agreement without public-key cryptography (extended abstract), Advances in Cryptology \u2014 CRYPTO\u201993, Lecture Notes in computer Science 773 (Springer, Berlin, 1994), pp. 456\u2013479.","DOI":"10.1007\/3-540-48329-2_39"},{"key":"10.1016\/S0167-4048(01)00711-8_BIB25","doi-asserted-by":"crossref","unstructured":"Y. Zheng, On key agreement protocols based on tamper-proof hardware, Information Processing Letters, 53, 1995, pp.49\u201354.","DOI":"10.1016\/0020-0190(94)00174-W"},{"key":"10.1016\/S0167-4048(01)00711-8_BIB26","unstructured":"B. Schneier, Applied cryptography, 2nd Edition, John Wiley & Sons, Inc, 1996, pp.429\u2013455."},{"key":"10.1016\/S0167-4048(01)00711-8_BIB27","doi-asserted-by":"crossref","unstructured":"C. H. Lin, Dynamic key management schemes for access control in a hierarchy, Computer Communications, 20, 1997, pp.1381\u20131385.","DOI":"10.1016\/S0140-3664(97)00100-X"}],"container-title":["Computers &amp; Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404801007118?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404801007118?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,1,7]],"date-time":"2020-01-07T23:40:55Z","timestamp":1578440455000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167404801007118"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001,10]]},"references-count":27,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2001,10]]}},"alternative-id":["S0167404801007118"],"URL":"https:\/\/doi.org\/10.1016\/s0167-4048(01)00711-8","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[2001,10]]}}}