2007
DOI: 10.1016/j.comnet.2006.12.011
|View full text |Cite
|
Sign up to set email alerts
|

Key management for content access control in a hierarchy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
37
0

Year Published

2009
2009
2021
2021

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 45 publications
(38 citation statements)
references
References 35 publications
0
37
0
Order By: Relevance
“…3a), then after the key renewal the keys (1) has not the same value for both cases after the membership change even if it had the same size, 3, before it. This is due to the fact that Z t (1) depends on the contents of the keys table, which is related to the process history, thus fulfilling the Markov property.…”
Section: A Markov Process Model For Ktlhmentioning
confidence: 98%
See 4 more Smart Citations
“…3a), then after the key renewal the keys (1) has not the same value for both cases after the membership change even if it had the same size, 3, before it. This is due to the fact that Z t (1) depends on the contents of the keys table, which is related to the process history, thus fulfilling the Markov property.…”
Section: A Markov Process Model For Ktlhmentioning
confidence: 98%
“…Key management typical tasks are Resource Encryption Keys (REK) generation and renewal [1]. The REK renewal is necessary to ensure confidentiality when users join or leave the hierarchy.…”
Section: Key Management Schemes For Cachmentioning
confidence: 99%
See 3 more Smart Citations