Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Acta Electronica Sinica》 2001-02
Add to Favorite Get Latest Update

Key Management for Multilevel Security in Distributed Applications

QING Si-han,MENG Yang,LIU Ke-long (Institute of Software,The Chinese Academy of Sciences,Engineering Research Center for Information Security Technology,The Chinese Academy of Sciences,Beijing 100080,China)  
A key management scheme for multilevel security in distributed applications is presented.The scheme adopts BELL-LaPadula model as multilevel access control policies.We use Chinese Remainder Theorem,introduce the notions of first-secret-key-element,second-secret-key-element and writing-element,and construct sharing information of session key.The scheme is efficient,secure and dynamic.At the same time,there are many practical applications involving the scheme for key management such as meeting in the network and talking in the network etc.
【Fund】: 自然科学基金! (No.696730 1 6)
【CateGory Index】: TP393.07
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【References】
Chinese Journal Full-text Database 4 Hits
1 Du Qingling Zhang Limin(College of Information Security,the PLA Information Engineering University,Zhengzhou450002);Unconditionally Secure Authencation Schemes and Construction for Dy namic Conferences[J];Computer Engineering and Applications;2003-08
2 Wang Wenlong 1,2 Zhang Guishu 1 Wang Zecheng 1,31 (Institute of Network Information Security,East China Normal University,S hanghai200062) 2 (Department of Computer and Information Engineering,Kashgar Teacher's Col lege,Kashgar,Xinjiang844007) 3 (Network Center,Anhui Institute of Finance and Trade,Bengbu,Anhui 23 3041);Cryptographic Key Management of Enterprise_oriented Application System[J];Computer Engineering and Applications;2004-01
3 Lu Jianzhu Chen Huoyan(Department of Computer Science,Jinan University,Guangzhou510632);New Dynamic Key Management Schemes for Access Control in a Hierarchy[J];Computer Engineering and Applications;2004-15
4 DU Qing ling,LIU Yuan,ZHANG Li min (Institute of Information Security,Information Engineering University,Zhengzhou 450002,China);Authentication Schemes and Their Construction for Dynamic Conferences[J];Journal of Information Engineering University;2001-04
【Co-references】
Chinese Journal Full-text Database 10 Hits
1 ;The Modeling & Design of EG Official Document Flowing Systems in Universities & Colleges[J];Office Automation;2006-05
2 ZHANG Jian hui, LI Chang yun, MA Rei ( Zhuzhou Institute of Technology, Zhuzhou 412008, China);Electron Public Activity Solution --State Documents Examination and Approval System[J];Packaging Engineering;2002-S1
3 Feng Dengguo;Pei Dingyi(State Key Laboratory of Information Security, Graduate School of Academia Sinica, Beijing 100039);A Construction of Unconditionally Secure Authentication Codes[J];Acta Electronica Sinica;1997-04
4 MA Wen ping,WANG Xin mei(State key Lab.on ISN,Xidian University,Xian 710071,China);Several New Constructions on Multitransmitters Authentication Codes[J];ACTA ELECTRONICA SINICA;2000-04
5 DAI Qiong-hai, QIN Yi-li, ZHANG Ying(Dept. of Automation, Tsinghua University, Beijing 100084, China);Access Control and Group Key Management of IP Multicast[J];Acta Electronica Sinica;2002-S1
6 Li zhongxian Zhan Banghua Yang Yixian (Beijing University of Posts and Telecommunications,Beijing 100876);A Survey of Identification and Authentication[J];ACTA ELECTRONICA SINICA;1999-01
7 Wang Yongchuan,Yang Yixian (P.O.Box 126,Information Security Center of Beijing University of Posts and Telecommunications,Beijing 100876);Information Theoretic Lower Bounds for Authentication Codes with Arbiter[J];ACTA ELECTRONICA SINICA;1999-04
8 Zhang Jianzhong Xiao Guozhen(Department of Mathematics, Shaanxi Normal University, Xi'an 710062, China) (Research Institute of Information Privacy, Xidian University, Xi'an 710071, China);THE CONSTRUCTIONS OF AUTHENTICATION CODES WITH HASHING[J];Journal of Electronics and Information Technology;2001-06
9 Wu Shaobo 1, Yu Jue 2 (1. Beijing Institute of Machinery, Beijing 100085, China; 2. Harbin Institute of Technology, Harbin 150001, China);The Solving Project for E-mail Security[J];Heilongjiang Electronic Technology;2003-03
10 Pan Guoqiang*, Gu Chunhua and Wu Dingyi(Department of Computer Science and Engineering ECUST, Shanghai 200237);A Digital Signature Architecture for Databases[J];JOURNAL OF EAST CHINA UNIVERSITY OF SCIENCE AND TECHNOLOGY;1998-02
【Secondary References】
Chinese Journal Full-text Database 2 Hits
1 JIA Xue-fang1,2, HOU Zheng-feng1 (1.School of Computer & Information,Hefei 230009,China; 2.Ningbo Dahongying University, Ningbo 315175,China);Discussion on the Design of Oracle Database Encryption[J];Computer Knowledge and Technology;2009-25
2 JIA Xue-fang1,2,HOU Zheng-feng1(1.School of Computer & Information,Hefei University of Technology,Hefei 230009,China; 2.School of Economics and Management,Ningbo Dahongying University);Research of Database Encryption Technology Based on VC[J];Computer Era;2010-01
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved