A KEY-MANAGEMENT SCHEME BASED ON CONTROL VECTORS

被引:7
|
作者
MATYAS, SM [1 ]
LE, AV [1 ]
ABRAHAM, DG [1 ]
机构
[1] IBM CORP,US MARKETING & SERV,CHARLOTTE,NC 28257
关键词
D O I
10.1147/sj.302.0175
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a cryptographic key-management scheme based on control vectors. This is a new concept that permits cryptographic keys belonging to a cryptographic system to be easily, securely, and efficiently controlled. The new key-management scheme-built on the cryptographic architecture and key management implemented in a prior set of IBM cryptographic products-has been implemented in the newly announced IBM Transaction Security System.
引用
收藏
页码:175 / 191
页数:17
相关论文
共 50 条
  • [21] Secure key management scheme for dynamic hierarchical access control based on ECC
    Lin, Yu-Li
    Hsu, Chien-Lung
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (04) : 679 - 685
  • [22] A centralized key management scheme for hierarchical access control
    Zhang, Q
    Wang, YK
    [J]. GLOBECOM '04: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6, 2004, : 2067 - 2071
  • [23] Multicast Key Management Scheme Based on TOFT
    Zhou, Fucai
    Xu, Jian
    Lin, Long
    Xu, Haifang
    [J]. HPCC 2008: 10TH IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2008, : 1030 - +
  • [24] Evaluation of Key Management Scheme Based on Identity
    Ramesh, Ch.
    Rao, K. Venu Gopal
    Vasumathi, D.
    [J]. 2016 IEEE 6TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (IACC), 2016, : 545 - 550
  • [25] A Simple Key Management Scheme based on WiMAX
    Lang Wei-min
    Wu Run-sheng
    Wang Jian-qiu
    [J]. ISCSCT 2008: INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY, VOL 1, PROCEEDINGS, 2008, : 3 - +
  • [26] A Key Management Scheme Based on Outsourced Database
    Shi, Yonghui
    Wang, Kunfu
    [J]. PROCEEDINGS OF THE 2017 2ND INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION AND ARTIFICIAL INTELLIGENCE (CAAI 2017), 2017, 134 : 455 - 460
  • [27] Anomaly Detection in Key-Management Activities Using Metadata: A Case Study and Framework
    Baee, Mir Ali Rezazadeh
    Simpson, Leonie
    Armstrong, Warren
    [J]. IEEE OPEN JOURNAL OF THE COMPUTER SOCIETY, 2024, 5 : 315 - 328
  • [28] The Key Management Scheme of Wireless Sensor Networks Based on Key Database
    Wan Ting
    Zhuo Li
    Wei Yan
    Zhang Qing
    Liu Gang
    [J]. ISTM/2011: 9TH INTERNATIONAL SYMPOSIUM ON TEST AND MEASUREMENT, 2011, : 710 - 713
  • [29] A key management scheme for hierarchical access control in group communication
    Zhang, Qiong
    Wang, Yuke
    Jue, Jason P.
    [J]. International Journal of Network Security, 2008, 7 (03) : 323 - 334
  • [30] An Efficient Key Management Scheme for Access Control in a User Hierarchy
    Zhang, Jianmin
    Li, Jian
    Liu, Xiande
    [J]. 2009 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND COMPUTER SCIENCE, VOL 1, PROCEEDINGS, 2009, : 550 - +