{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,1,31]],"date-time":"2023-01-31T02:28:47Z","timestamp":1675132127880},"reference-count":27,"publisher":"Elsevier BV","issue":"6","license":[{"start":{"date-parts":[[2008,8,1]],"date-time":"2008-08-01T00:00:00Z","timestamp":1217548800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Standards & Interfaces"],"published-print":{"date-parts":[[2008,8]]},"DOI":"10.1016\/j.csi.2008.03.009","type":"journal-article","created":{"date-parts":[[2008,3,11]],"date-time":"2008-03-11T11:24:01Z","timestamp":1205234641000},"page":"410-417","source":"Crossref","is-referenced-by-count":7,"title":["Efficient key management for cryptographically enforced access control"],"prefix":"10.1016","volume":"30","author":[{"given":"Anna","family":"Zych","sequence":"first","affiliation":[]},{"given":"Milan","family":"Petkovi\u0107","sequence":"additional","affiliation":[]},{"given":"Willem","family":"Jonker","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.csi.2008.03.009_bib1","unstructured":"Advanced access content systems. see http:\/\/www.aaclsa.com."},{"key":"10.1016\/j.csi.2008.03.009_bib2","unstructured":"Copy protection for recordable media and copy protection for prerecordable media. see htpp:\/\/www.4centity.com\/tech\/cprm."},{"key":"10.1016\/j.csi.2008.03.009_bib3","unstructured":"The ieee p1363 home page. standard specifications for public-key cryptography. see http:\/\/grouper.ieee.org\/groups\/1363\/."},{"key":"10.1016\/j.csi.2008.03.009_bib4","unstructured":"International organization for standardization. key management \u2013 part 3: Mechanisms using asymmetric techniques. see http:\/\/www.iso.org\/."},{"key":"10.1016\/j.csi.2008.03.009_bib5","unstructured":"The internet engineering task force. tls working group. transport layer security. see http:\/\/www.ietf.org\/html.charters\/tls-charter.html."},{"key":"10.1016\/j.csi.2008.03.009_bib6","unstructured":"Nist role based access control. see http:\/\/csrc.nist.gov\/rbac\/."},{"key":"10.1016\/j.csi.2008.03.009_bib7","unstructured":"Philips and hp. system description video content protection system. Version 1.32. see http:\/\/licensing.philips.com\/vcps."},{"key":"10.1016\/j.csi.2008.03.009_bib8","unstructured":"Rsa laboratories. pkcs number three: Diffie\u2013Hellman key agreement standard. see hhttp:\/\/www.rsa.com\/rsalabs\/node.asp?id=2126."},{"key":"10.1016\/j.csi.2008.03.009_bib9","unstructured":"Security assertion markup language. version 2.0. oasis security service tc. see http:\/\/www.oasis-open.org\/specs\/, 2005."},{"key":"10.1016\/j.csi.2008.03.009_bib10","unstructured":"extensible access control markup language (xacml). oasis. see http:\/\/www.oasis-open.org\/\/specs\/, 2007."},{"issue":"3","key":"10.1016\/j.csi.2008.03.009_bib11","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1145\/357369.357372","article-title":"Cryptographic solution to a problem of access control in a hierarchy","volume":"1","author":"Akl","year":"1983","journal-title":"ACM Trans. Comput. Syst."},{"key":"10.1016\/j.csi.2008.03.009_bib12","series-title":"ASIACRYPT '02: Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security","first-page":"433","article-title":"A revocation scheme with minimal storage at receivers","author":"Asano","year":"2002"},{"key":"10.1016\/j.csi.2008.03.009_bib13","series-title":"CCS '02: Proceedings of the 9th ACM conference on Computer and communications security","first-page":"31","article-title":"A temporal key management scheme for secure broadcasting of xml documents","author":"Bertino","year":"2002"},{"issue":"6","key":"10.1016\/j.csi.2008.03.009_bib14","doi-asserted-by":"crossref","first-page":"523","DOI":"10.1016\/S0167-4048(03)00613-8","article-title":"New hierarchical assignment without public key cryptography","volume":"22","author":"Chien","year":"2003","journal-title":"Comput. Secur."},{"key":"10.1016\/j.csi.2008.03.009_bib15","series-title":"CSFW '06: Proceedings of the 19th IEEE Workshop on Computer Security Foundations","first-page":"98","article-title":"On key assignment for hierarchical access control","author":"Crampton","year":"2006"},{"key":"10.1016\/j.csi.2008.03.009_bib16","series-title":"CRYPTO '93: Proceedings of the 13th annual international cryptology conference on Advances in cryptology","first-page":"480","article-title":"Broadcast encryption","author":"Fiat","year":"1994"},{"issue":"6","key":"10.1016\/j.csi.2008.03.009_bib17","doi-asserted-by":"crossref","first-page":"539","DOI":"10.1016\/0167-4048(90)90132-D","article-title":"A cryptographic key generation scheme for multilevel data security","volume":"9","author":"Harn","year":"1990","journal-title":"Comput. Secur."},{"issue":"2","key":"10.1016\/j.csi.2008.03.009_bib18","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1016\/S0164-1212(02)00091-2","article-title":"Controlling access in large partially ordered hierarchies using cryptographic keys","volume":"67","author":"Hwang","year":"2003","journal-title":"J. Syst. Softw."},{"issue":"5","key":"10.1016\/j.csi.2008.03.009_bib19","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1109\/MIC.2004.44","article-title":"Ldap: framework, practices, and trends","volume":"8","author":"Koutsonikola","year":"2004","journal-title":"Internet Computing"},{"key":"10.1016\/j.csi.2008.03.009_bib20","first-page":"235","article-title":"Cryptographic key assignment scheme for dynamic access control in a user hierarchy","volume":"vol. 146","author":"Chen","year":"1999"},{"issue":"1","key":"10.1016\/j.csi.2008.03.009_bib21","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1016\/S0140-3664(98)00216-3","article-title":"Comments on dynamic key management schemes for access control in a hierarchy'","volume":"22","author":"Lee","year":"1999","journal-title":"Comput. Commun."},{"issue":"15","key":"10.1016\/j.csi.2008.03.009_bib22","doi-asserted-by":"crossref","first-page":"1381","DOI":"10.1016\/S0140-3664(97)00100-X","article-title":"Dynamic key management schemes for access control in a hierarchy","volume":"20","author":"Lin","year":"1997","journal-title":"Comput. Commun."},{"issue":"7","key":"10.1016\/j.csi.2008.03.009_bib23","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1016\/S0167-4048(01)00711-8","article-title":"Hierarchical key assignment without public-key cryptography","volume":"20","author":"Lin","year":"2001","journal-title":"Comput Secur."},{"issue":"4","key":"10.1016\/j.csi.2008.03.009_bib24","doi-asserted-by":"crossref","first-page":"457","DOI":"10.1016\/S0167-739X(02)00200-5","article-title":"A new key assignment scheme for enforcing complicated access control policies in hierarchy","volume":"19","author":"Lin","year":"2003","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.csi.2008.03.009_bib25","series-title":"CRYPTO '01: Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology","first-page":"41","article-title":"Revocation and tracing schemes for stateless receivers","author":"Naor","year":"2001"},{"key":"10.1016\/j.csi.2008.03.009_bib26","unstructured":"David S. Touretzky. Content scrambling system. carnegie mellon university. see http:\/\/www.cs.cmu.edu\/ dst\/DeCSS."},{"issue":"6","key":"10.1016\/j.csi.2008.03.009_bib27","doi-asserted-by":"crossref","first-page":"565","DOI":"10.1016\/S0167-4048(02)01016-7","article-title":"Hierarchical access control based on Chinese remainder theorem and symmetric algorithm","volume":"21","author":"Chung","year":"2002","journal-title":"Comput. Secur."}],"container-title":["Computer Standards & Interfaces"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0920548908000299?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0920548908000299?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2018,12,30]],"date-time":"2018-12-30T23:30:57Z","timestamp":1546212657000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0920548908000299"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,8]]},"references-count":27,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2008,8]]}},"alternative-id":["S0920548908000299"],"URL":"https:\/\/doi.org\/10.1016\/j.csi.2008.03.009","relation":{},"ISSN":["0920-5489"],"issn-type":[{"value":"0920-5489","type":"print"}],"subject":[],"published":{"date-parts":[[2008,8]]}}}