搜索结果: 1-3 共查到“军队指挥学 hierarchical access control”相关记录3条 . 查询时间(0.062 秒)
CloudHKA: A Cryptographic Approach for Hierarchical Access Control in Cloud Computing
cryptographic protocols / access control hierarchical key assignment
2013/4/18
Cloud services are blooming recently. They provide a convenient way for data accessing, sharing, and processing. A key ingredient for successful cloud services is to control data access while consider...
Yet Another Attack On the Chinese Remainder Theorem Based Hierarchical Access Control Scheme
communication security CRTHACS Chinese remainder theorem hierarchical access control secure group communication
2013/4/18
The hierarchical access control scheme based on Chinese Reminder Theorem [49] (CRTHACS) was supposed to be capable of hiding hierarchical structure, but Geiselmann et al. [18] showed practical attacks...
Attacks on a Secure Group Communication Scheme With Hierarchical Access Control
hierarchical access control cryptanalysis
2009/4/10
At ICICS 2001, Zou, Ramamurthy, and Magliveras proposed
CRTHACS, a chinese remainder theorem based scheme for secure group
communication with hierarchical access control. The scheme is designed
in ...