{"id":"https://openalex.org/W2021328268","doi":"https://doi.org/10.1145/1455526.1455531","title":"Dynamic and Efficient Key Management for Access Hierarchies","display_name":"Dynamic and Efficient Key Management for Access Hierarchies","publication_year":2009,"publication_date":"2009-01-01","ids":{"openalex":"https://openalex.org/W2021328268","doi":"https://doi.org/10.1145/1455526.1455531","mag":"2021328268"},"language":"en","primary_location":{"id":"doi:10.1145/1455526.1455531","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1455526.1455531","pdf_url":null,"source":{"id":"https://openalex.org/S2642811","display_name":"ACM Transactions on Information and System Security","issn_l":"1094-9224","issn":["1094-9224","1557-7406"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Information and System Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5113562454","display_name":"Mikhail J. Atallah","orcid":null},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Mikhail J. Atallah","raw_affiliation_strings":["Purdue University"],"affiliations":[{"raw_affiliation_string":"Purdue University","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086333356","display_name":"Marina Blanton","orcid":"https://orcid.org/0009-0008-9934-2700"},"institutions":[{"id":"https://openalex.org/I107639228","display_name":"University of Notre Dame","ror":"https://ror.org/00mkhxb43","country_code":"US","type":"education","lineage":["https://openalex.org/I107639228"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Marina Blanton","raw_affiliation_strings":["University of Notre Dame"],"affiliations":[{"raw_affiliation_string":"University of Notre Dame","institution_ids":["https://openalex.org/I107639228"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028509574","display_name":"Nelly Fazio","orcid":"https://orcid.org/0009-0000-8690-4112"},"institutions":[{"id":"https://openalex.org/I1341412227","display_name":"IBM (United States)","ror":"https://ror.org/05hh8d621","country_code":"US","type":"company","lineage":["https://openalex.org/I1341412227"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Nelly Fazio","raw_affiliation_strings":["IBM Research","IBM Research, -"],"affiliations":[{"raw_affiliation_string":"IBM Research","institution_ids":[]},{"raw_affiliation_string":"IBM Research, -","institution_ids":["https://openalex.org/I1341412227"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5012185988","display_name":"Keith B. Frikken","orcid":null},"institutions":[{"id":"https://openalex.org/I83328450","display_name":"Miami University","ror":"https://ror.org/05nbqxr67","country_code":"US","type":"education","lineage":["https://openalex.org/I83328450"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Keith B. Frikken","raw_affiliation_strings":["Miami University","Miami University;"],"affiliations":[{"raw_affiliation_string":"Miami University","institution_ids":["https://openalex.org/I83328450"]},{"raw_affiliation_string":"Miami University;","institution_ids":["https://openalex.org/I83328450"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5113562454"],"corresponding_institution_ids":["https://openalex.org/I219193219"],"apc_list":null,"apc_paid":null,"fwci":26.6461,"has_fulltext":false,"cited_by_count":285,"citation_normalized_percentile":{"value":0.99676208,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"12","issue":"3","first_page":"1","last_page":"43"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7750929594039917},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5954052209854126},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5645892024040222},{"id":"https://openalex.org/keywords/hierarchy","display_name":"Hierarchy","score":0.5567926168441772},{"id":"https://openalex.org/keywords/class","display_name":"Class (philosophy)","score":0.45336443185806274},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.4498502314090729},{"id":"https://openalex.org/keywords/bounded-function","display_name":"Bounded function","score":0.4416372776031494},{"id":"https://openalex.org/keywords/key-distribution","display_name":"Key distribution","score":0.41559308767318726},{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.41240859031677246},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.24204182624816895},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.20618936419487},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1904239058494568}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7750929594039917},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5954052209854126},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5645892024040222},{"id":"https://openalex.org/C31170391","wikidata":"https://www.wikidata.org/wiki/Q188619","display_name":"Hierarchy","level":2,"score":0.5567926168441772},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.45336443185806274},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.4498502314090729},{"id":"https://openalex.org/C34388435","wikidata":"https://www.wikidata.org/wiki/Q2267362","display_name":"Bounded function","level":2,"score":0.4416372776031494},{"id":"https://openalex.org/C160333310","wikidata":"https://www.wikidata.org/wiki/Q6398153","display_name":"Key distribution","level":4,"score":0.41559308767318726},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.41240859031677246},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.24204182624816895},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.20618936419487},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1904239058494568},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C34447519","wikidata":"https://www.wikidata.org/wiki/Q179522","display_name":"Market economy","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1145/1455526.1455531","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1455526.1455531","pdf_url":null,"source":{"id":"https://openalex.org/S2642811","display_name":"ACM Transactions on Information and System Security","issn_l":"1094-9224","issn":["1094-9224","1557-7406"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Information and System Security","raw_type":"journal-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.158.9762","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.158.9762","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cerias.purdue.edu/ssl/techreports-ssl/2006-09.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.61.720","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.61.720","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cs.purdue.edu/homes/mbykova/papers/ccs05.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.550000011920929}],"awards":[{"id":"https://openalex.org/G2262391457","display_name":null,"funder_award_id":"IIS-0325345CNS-06274488","funder_id":"https://openalex.org/F4320337389","funder_display_name":"Division of Information and Intelligent Systems"},{"id":"https://openalex.org/G7388480847","display_name":null,"funder_award_id":"IIS-0325345CNS-06274488","funder_id":"https://openalex.org/F4320337388","funder_display_name":"Division of Computer and Network Systems"}],"funders":[{"id":"https://openalex.org/F4320337388","display_name":"Division of Computer and Network Systems","ror":"https://ror.org/02rdzmk74"},{"id":"https://openalex.org/F4320337389","display_name":"Division of Information and Intelligent Systems","ror":"https://ror.org/053a2cp42"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":78,"referenced_works":["https://openalex.org/W13261732","https://openalex.org/W1503252650","https://openalex.org/W1539393186","https://openalex.org/W1539780672","https://openalex.org/W1548880861","https://openalex.org/W1570685538","https://openalex.org/W1573661867","https://openalex.org/W1577886864","https://openalex.org/W1583816927","https://openalex.org/W1584548721","https://openalex.org/W1596647266","https://openalex.org/W1597805936","https://openalex.org/W1603384057","https://openalex.org/W1722462003","https://openalex.org/W1840081982","https://openalex.org/W1918015020","https://openalex.org/W1951707894","https://openalex.org/W1967843292","https://openalex.org/W1969446695","https://openalex.org/W1982128483","https://openalex.org/W1990159067","https://openalex.org/W1993090666","https://openalex.org/W1994547554","https://openalex.org/W2006440641","https://openalex.org/W2008917386","https://openalex.org/W2011306574","https://openalex.org/W2011999472","https://openalex.org/W2013623332","https://openalex.org/W2013833881","https://openalex.org/W2015414742","https://openalex.org/W2022754388","https://openalex.org/W2027145511","https://openalex.org/W2028378019","https://openalex.org/W2031338211","https://openalex.org/W2036752160","https://openalex.org/W2037291165","https://openalex.org/W2042334369","https://openalex.org/W2044989918","https://openalex.org/W2047537125","https://openalex.org/W2047899424","https://openalex.org/W2049001539","https://openalex.org/W2051078227","https://openalex.org/W2054515545","https://openalex.org/W2061246361","https://openalex.org/W2064457255","https://openalex.org/W2066600013","https://openalex.org/W2069001533","https://openalex.org/W2075138637","https://openalex.org/W2081163699","https://openalex.org/W2083176195","https://openalex.org/W2099540965","https://openalex.org/W2103317919","https://openalex.org/W2105916855","https://openalex.org/W2113740183","https://openalex.org/W2115968181","https://openalex.org/W2116923305","https://openalex.org/W2118469945","https://openalex.org/W2118933964","https://openalex.org/W2131300413","https://openalex.org/W2132445073","https://openalex.org/W2134354477","https://openalex.org/W2141457943","https://openalex.org/W2145805178","https://openalex.org/W2157679418","https://openalex.org/W2159945615","https://openalex.org/W2160549424","https://openalex.org/W2162022335","https://openalex.org/W2166602595","https://openalex.org/W2167447184","https://openalex.org/W2226642096","https://openalex.org/W2233233025","https://openalex.org/W2325654786","https://openalex.org/W3028636171","https://openalex.org/W3151647019","https://openalex.org/W4319782100","https://openalex.org/W4399554296","https://openalex.org/W6677338817","https://openalex.org/W6826393410"],"related_works":["https://openalex.org/W1486255205","https://openalex.org/W3029593079","https://openalex.org/W2613410895","https://openalex.org/W2112914778","https://openalex.org/W2387773210","https://openalex.org/W2364255832","https://openalex.org/W2161209604","https://openalex.org/W2022961789","https://openalex.org/W1965775254","https://openalex.org/W1881033081"],"abstract_inverted_index":{"Hierarchies":[0],"arise":[1],"in":[2,47,67,136,324,329],"the":[3,9,48,68,91,95,99,103,109,112,137,140,153,168,171,174,187,207,224,229,234,239,250,270,327,330,336,347,369],"context":[4],"of":[5,18,52,60,98,107,119,155,157,163,170,182,192,196,214,231,242,258,273,297,307,332,368],"access":[6,30,36,295],"control":[7],"whenever":[8],"user":[10,28],"population":[11],"can":[12,76,151],"be":[13,77],"modeled":[14],"as":[15,23,105,281],"a":[16,24,33,62,85,116,120,161,254,276,303],"set":[17],"partially":[19],"ordered":[20],"classes":[21,46,75],"(represented":[22],"directed":[25],"graph).":[26],"A":[27],"with":[29,90,124,160,238],"privileges":[31],"for":[32,55,73,260,287,318],"class":[34,42,66,117],"obtains":[35],"to":[37,64,87,222,248,253,346,355,361,372],"objects":[38],"stored":[39],"at":[40,115,228],"that":[41,71,106,125,189,218,262,305],"and":[43,131,147,266,311,326,375],"all":[44,191],"descendant":[45,74,159],"hierarchy.":[49,240,291],"The":[50,194,314],"problem":[51,89],"key":[53,63,81,122,154,225,251,315],"management":[54],"such":[56,280,319],"hierarchies":[57,296,371],"then":[58,322],"consists":[59,118,306],"assigning":[61],"each":[65,149],"hierarchy":[69],"so":[70],"keys":[72],"obtained":[78],"via":[79],"efficient":[80],"derivation.":[82],"We":[83],"propose":[84],"solution":[86],"this":[88,215],"following":[92],"properties:":[93],"(1)":[94],"space":[96],"complexity":[97],"public":[100,235],"information":[101,114],"is":[102,142,186,199,217,321,334],"same":[104],"storing":[108],"hierarchy;":[110,138],"(2)":[111],"private":[113],"single":[121],"associated":[123,237],"class;":[126],"(3)":[127],"updates":[128],"(i.e.,":[129],"revocations":[130],"additions)":[132],"are":[133,220,263],"handled":[134],"locally":[135],"(4)":[139],"scheme":[141,198],"provably":[143],"secure":[144],"against":[145],"collusion;":[146],"(5)":[148],"node":[150],"derive":[152],"any":[156],"its":[158],"number":[162,257,272,331],"symmetric-key":[164],"operations":[165],"bounded":[166],"by":[167,268,275,335,351,365],"length":[169],"path":[172],"between":[173],"nodes.":[175],"Whereas":[176],"many":[177],"previous":[178],"schemes":[179],"had":[180],"some":[181],"these":[183],"properties,":[184],"ours":[185],"first":[188],"satisfies":[190],"them.":[193],"security":[195],"our":[197,356],"based":[200],"on":[201,206],"pseudorandom":[202],"functions,":[203],"without":[204],"reliance":[205],"Random":[208],"Oracle":[209],"Model.":[210],"Another":[211],"substantial":[212],"contribution":[213],"work":[216,317],"we":[219,301,358],"able":[221],"lower":[223,249],"derivation":[226,252,316],"time":[227],"expense":[230],"modestly":[232],"increasing":[233,269],"storage":[236],"Insertion":[241],"additional,":[243],"so-called":[244],"shortcut,":[245],"edges,":[246],"allows":[247],"small":[255,277],"constant":[256],"steps":[259],"graphs":[261,320],"total":[264,271],"orders":[265],"trees":[267],"edges":[274,333],"asymptotic":[278],"factor":[279,337],"O":[282,338],"(log":[283,339],"*":[284],"n":[285,289,343],")":[286,344],"an":[288],"-node":[290],"For":[292],"more":[293],"general":[294],"dimension":[298,312],"d":[299,325,340],",":[300],"use":[302],"technique":[304],"adding":[308],"dummy":[309],"nodes":[310],"reduction.":[313],"linear":[323],"increase":[328],"\u2212":[341],"1":[342],"compared":[345],"one-dimensional":[348],"case.":[349],"Finally,":[350],"making":[352],"simple":[353],"modifications":[354],"scheme,":[357],"show":[359],"how":[360],"handle":[362],"extensions":[363],"proposed":[364],"Crampton":[366],"[2003]":[367],"standard":[370],"\u201climited":[373],"depth\u201d":[374],"reverse":[376],"inheritance.":[377]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":8},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":12},{"year":2021,"cited_by_count":15},{"year":2020,"cited_by_count":13},{"year":2019,"cited_by_count":12},{"year":2018,"cited_by_count":15},{"year":2017,"cited_by_count":19},{"year":2016,"cited_by_count":26},{"year":2015,"cited_by_count":42},{"year":2014,"cited_by_count":24},{"year":2013,"cited_by_count":24},{"year":2012,"cited_by_count":19}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
