By Topic

A hierarchical key management scheme in role-based access control

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Guangliang Liu ; Sch. of Comput. Sci., Liaocheng Univ., Liaocheng, China ; Lingyun Li ; Jian Zheng ; Zhaoguo Li

The role-based access control model, often related to the permissions of hierarchical role. The encryption mechanism was introduced to this article, put forward a hierarchical management program of the role master key which based on the elliptic curve, to carry out the key management of the objective resources by the role master key, to realize the mechanism of hierarchical role character in the RBAC model by the hierarchical key management. Compared with the hierarchical key management program that has been put forward, in this program, the calculating efficiency of the key and the safety performance have been optimized, and the program can adapt to the dynamic diversification of the role better.

Published in:

Computer Design and Applications (ICCDA), 2010 International Conference on  (Volume:5 )

Date of Conference:

25-27 June 2010