2016
DOI: 10.1007/s11280-016-0408-y
|View full text |Cite
|
Sign up to set email alerts
|

An efficient key management scheme for user access control in outsourced databases

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 25 publications
0
1
0
Order By: Relevance
“…Sciancalepore et al [24], have proposed a distributed key management scheme in the IoT where two nodes cooperate to compute a symmetric key after they have authenticated each other. Hong et al [7], have proposed a key management scheme for outsourced access control in the cloud computing. To diminish key generation cost by merging repeated data resources, Hong et al have proposed a key generation algorithm based upon RST (Resource Set Tree).…”
Section: Key Management Schemesmentioning
confidence: 99%
“…Sciancalepore et al [24], have proposed a distributed key management scheme in the IoT where two nodes cooperate to compute a symmetric key after they have authenticated each other. Hong et al [7], have proposed a key management scheme for outsourced access control in the cloud computing. To diminish key generation cost by merging repeated data resources, Hong et al have proposed a key generation algorithm based upon RST (Resource Set Tree).…”
Section: Key Management Schemesmentioning
confidence: 99%