1274
计算机研究与发展2013,50(6)
S
Y,Laih
C
of
scheme
Hwang—Yang
(吴振强,周彦伟,马建峰.物联网安全传输模型[J].计算
机学报,201I:i35i-i364)
[19] Wang
S.Cryptanalysis
for
access in
ordered hierarchies
large partially
controlling
Gershenfeld
E5]
N,Krikorian R,Cohen D.The Internet of
of
and
Systems
Software,2005,75(1):189—
[J].Journal
192
American,2004,291(4):76—81
things[J].Scientific
Ashton K.That‘Internet of
Things’Thing[J].RFiD
E6]
[7]
[20] Chen
dynamic
Mathematics and
J
Y.A novel
scheme for
key management
S,Huang
Journal,2009,22(2):97—114
access control in
a user
hierarchy[J].Applied
Tuters M,Varnelis
to the internet of
locative
media:Giving shape
K.Beyond
62(1):339—35
l
Computation,2005,1
HwangM S,Yang WP.Controlling access in
things[J].Leonardo,2006,39(4):357—
[21]
[22]
[23]
[24]
[25]
[26]
large partially
363
hierarchies
of
ordered
using cryptographic keys[J].Journal
Atzori
L,Iera A,Morabito G.The internet of
E83
[9]
things:A
andSoftware,2003,67(2):99—107
Systems
Chien
survey[J].Computer Networks,2010,54(5):2787~2805
J
K.New hierarchical
without
assignment
Y,Jan
Sandhu
control
E,Feinstein H.et a1.Role—based access
R,Coyne
public key cryptography[J].Computers&Security,2003,
22(6):523—526
models[J].IEEE Computer,1996,29(2):38—47
N.A Web service
R
[10] Hebig
architecture for decentralized
attribute—based access control
of
Sorniotti A,Molva R,Gomez I。,et a1.Efficient access
identity—and
Ec]/Proc
IEEE Int Conf on Web
2009:55l一558
control for wireless sensor
of Wireless
Service.Piscataway,NJ:IEEE,
data[J].Int Journal
Information Networks,2009。16(3):1 65—174
Hummer W,Gaubatz
[11]
P,Strembeck M.An
integrated
Zou
SS.Chinese Remainder
X,Ramamurthy B,Magliveras
for
and
in
access
a SOA
approach
identity
management
TheoremBased Hierarchical Access Control for Secure
Communication[M].Berlin:Springer,2001:381—385
Group
context[c]//Proc of the 16th ACM
on Access Control
Symp
Models and
Akl
Technologies.New York:ACM,2011:2l一30
solution to a
Gudes E.The
of
a
based secure file
cryptography
design
of
problem
[i2]
[13]
S,Taylor P.Cryptographic
Trans on Software
system[J].IEEE
(5):411—420
Engineering,1980,6
access control in
a
Trans on
Computer
hierarchy[J].ACM
Systems,1983,1(3):239—248
Yah
M
Atallah
J,Blanton M。Frikken
B.Incorporating
Schemes
Existing Key Management
Junzhi,Li
hierarchical
Fenghua,Ma Jianfeng.A
key
in
Temporal Capabilities
scheme based on diffie—hellman
assignment
algorithm[J].
[M].Berlin:Springer,2007:515-530
[27] Goldreich O,Goldwasser S。Micali S.How to construct
Chinese Journal of
Chinese)
Electronics,2011,39(1):119—123(in
random
of the
ACM(JACM),1986,
(阎军智,李凤华,马建峰.基于Diffie
functions[J].Journal
Hellman算法的分层
9-123)
33(4):792—807
密钥分配方案[J].电子学报,2011,39(1):11
access in
[14] Hwang M,Yang W.Controlling
large partially
De Santis A,Ferrara
Secure Pierarchical
L,Masucci B.Efficient
Provably—
[28]
[29]
ordered hierarchies
using
keys[J].Journal of
cryptographic
Key Assignment Schemes[M].Berlin:
and
Software,2003,67(2):99—107
Systems
Springer,2007:371—382
de Santis A,Ferrara
[15]
A,Masucci
B.Cryptographic key
Atallah
M
andefficient
of the 12th
J,Frikken
B,Blanton
M.Dynamic
schemes for
access control
assignment
Information
205
any
policy[J].
for access
key management
ACMConf on
hierarchies[c]/Proc
Letters(IPL).2004,92(4):199—
Processing
and Communications
Computer
Security.New
York:ACM,2005:190—202
E1Gamal T.A
and a
[163
[17]
public key
cryptosystem
signature
[30] Xu S.Sandhu R.A Scalable and Secure
Service[M].Berlin:Springer,2007:144-160
Ma Jun,Ma
Cryptographic
scheme
based on discrete
in
logarithms[c]//Advances
Cryptology.Berlin:Springer,1985:10一18
Yumin.A new scheme for
secure
[31]
Jianfeng,Guo Yuanbo.Provably
scheme for smartmobile
private
Ji
Dongyao,Zhang Futai,Wang
key protection
terminal[J].Journal
access control in multilevel
of
security system[J].Journal
5-720
Development,2001,38(6):7l
on Communications,2012,33(12):108—115(inChinese)
(马骏。马建峰,郭渊博.可证明安全的智能移动终端私钥保
护方案[J].通信学报,2012,33(12):108—115)
Research and
Computer
(in Chinese)
(姬东耀,张福泰,王育民.多级安全系统中访问控制新方案
[J].计算机研究与发展,2001,38(6):715-720)
Li
[18]
Fenghua,WangWei,Ma Jianfeng.Leveled group key
Ma
in 1981.PhD candidate at
Jun.born
for wireless
management
sensor
networks[J].Chinese
Xidian
China
Student member of
Federation.His main
include wireless network
University.
of
Journal
Electronics,2008,36(12):2405—2411(in
Computer
Chinese)
research interests
(李凤华,王巍,马建峰.适用于传感器网络的分级群组密钥
管理[J].电子学报,2008,36(12):2405—2411)
security,key assignment.
万方数据
全部评论(0)