{"id":"https://openalex.org/W2131076826","doi":"https://doi.org/10.1145/1755688.1755728","title":"Cryptographic role-based security mechanisms based on role-key hierarchy","display_name":"Cryptographic role-based security mechanisms based on role-key hierarchy","publication_year":2010,"publication_date":"2010-04-13","ids":{"openalex":"https://openalex.org/W2131076826","doi":"https://doi.org/10.1145/1755688.1755728","mag":"2131076826"},"language":"en","primary_location":{"id":"doi:10.1145/1755688.1755728","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1755688.1755728","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5039641353","display_name":"Yan Zhu","orcid":"https://orcid.org/0000-0002-9159-745X"},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]},{"id":"https://openalex.org/I1327237609","display_name":"Ministry of Education of the People's Republic of China","ror":"https://ror.org/01mv9t934","country_code":"CN","type":"funder","lineage":["https://openalex.org/I1327237609","https://openalex.org/I4210127390"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yan Zhu","raw_affiliation_strings":["Peking University, Beijing, China and Key Laboratory of Network and Software Security Assurance (Peking University), Ministry of Education, China","Peking University, Beijing, China and Key Laboratory of Network and Software Security Assurance (Peking University), Ministry of Education, China#TAB#"],"affiliations":[{"raw_affiliation_string":"Peking University, Beijing, China and Key Laboratory of Network and Software Security Assurance (Peking University), Ministry of Education, China","institution_ids":["https://openalex.org/I20231570"]},{"raw_affiliation_string":"Peking University, Beijing, China and Key Laboratory of Network and Software Security Assurance (Peking University), Ministry of Education, China#TAB#","institution_ids":["https://openalex.org/I1327237609"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025770693","display_name":"Gail\u2010Joon Ahn","orcid":"https://orcid.org/0000-0002-4271-1666"},"institutions":[{"id":"https://openalex.org/I55732556","display_name":"Arizona State University","ror":"https://ror.org/03efmqc40","country_code":"US","type":"education","lineage":["https://openalex.org/I55732556"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Gail-Joon Ahn","raw_affiliation_strings":["Arizona State University, Tempe, AZ"],"affiliations":[{"raw_affiliation_string":"Arizona State University, Tempe, AZ","institution_ids":["https://openalex.org/I55732556"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056657952","display_name":"Hongxin Hu","orcid":"https://orcid.org/0000-0001-8710-247X"},"institutions":[{"id":"https://openalex.org/I55732556","display_name":"Arizona State University","ror":"https://ror.org/03efmqc40","country_code":"US","type":"education","lineage":["https://openalex.org/I55732556"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hongxin Hu","raw_affiliation_strings":["Arizona State University, Tempe, AZ"],"affiliations":[{"raw_affiliation_string":"Arizona State University, Tempe, AZ","institution_ids":["https://openalex.org/I55732556"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5065227475","display_name":"Huaixi Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huaixi Wang","raw_affiliation_strings":["Peking University, Beijing, China","Peking University, Beijing, China#TAB#"],"affiliations":[{"raw_affiliation_string":"Peking University, Beijing, China","institution_ids":["https://openalex.org/I20231570"]},{"raw_affiliation_string":"Peking University, Beijing, China#TAB#","institution_ids":["https://openalex.org/I20231570"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5039641353"],"corresponding_institution_ids":["https://openalex.org/I1327237609","https://openalex.org/I20231570"],"apc_list":null,"apc_paid":null,"fwci":1.8642,"has_fulltext":false,"cited_by_count":16,"citation_normalized_percentile":{"value":0.90412476,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"314","last_page":"319"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13999","display_name":"Digital Rights Management and Security","score":0.9929999709129333,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7703884840011597},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.7152348756790161},{"id":"https://openalex.org/keywords/hierarchy","display_name":"Hierarchy","score":0.6728512644767761},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6492841839790344},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6103157997131348},{"id":"https://openalex.org/keywords/role-based-access-control","display_name":"Role-based access control","score":0.5702394843101501},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5687143206596375},{"id":"https://openalex.org/keywords/key-management","display_name":"Key management","score":0.5045453310012817},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.43068042397499084},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.42814886569976807},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4178541302680969},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.4060157835483551},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3453894257545471},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.09935158491134644}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7703884840011597},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.7152348756790161},{"id":"https://openalex.org/C31170391","wikidata":"https://www.wikidata.org/wiki/Q188619","display_name":"Hierarchy","level":2,"score":0.6728512644767761},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6492841839790344},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6103157997131348},{"id":"https://openalex.org/C45567728","wikidata":"https://www.wikidata.org/wiki/Q1702839","display_name":"Role-based access control","level":3,"score":0.5702394843101501},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5687143206596375},{"id":"https://openalex.org/C17886624","wikidata":"https://www.wikidata.org/wiki/Q1320561","display_name":"Key management","level":3,"score":0.5045453310012817},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.43068042397499084},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.42814886569976807},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4178541302680969},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.4060157835483551},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3453894257545471},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.09935158491134644},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C34447519","wikidata":"https://www.wikidata.org/wiki/Q179522","display_name":"Market economy","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1755688.1755728","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1755688.1755728","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2147575225","display_name":null,"funder_award_id":"2006AA01Z434","funder_id":"https://openalex.org/F4320321540","funder_display_name":"Ministry of Science and Technology of the People's Republic of China"},{"id":"https://openalex.org/G2784652695","display_name":null,"funder_award_id":"10990011","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321540","display_name":"Ministry of Science and Technology of the People's Republic of China","ror":"https://ror.org/027s68j25"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W100863554","https://openalex.org/W1538349060","https://openalex.org/W1572593068","https://openalex.org/W1591932736","https://openalex.org/W1905774212","https://openalex.org/W2006921752","https://openalex.org/W2013833881","https://openalex.org/W2022309237","https://openalex.org/W2031338211","https://openalex.org/W2060690494","https://openalex.org/W2067095453","https://openalex.org/W2133039888","https://openalex.org/W2143545186","https://openalex.org/W2145255308","https://openalex.org/W2152924492","https://openalex.org/W2166602595"],"related_works":["https://openalex.org/W2372156812","https://openalex.org/W2374393728","https://openalex.org/W2386545329","https://openalex.org/W2382286253","https://openalex.org/W2356011375","https://openalex.org/W1795360416","https://openalex.org/W2392979115","https://openalex.org/W1969771171","https://openalex.org/W819284483","https://openalex.org/W2370002471"],"abstract_inverted_index":{"Even":[0],"though":[1],"role-based":[2,70],"access":[3],"control":[4],"(RBAC)":[5],"can":[6],"tremendously":[7],"help":[8,59],"us":[9],"minimize":[10],"the":[11,22,27,58,75,95],"complexity":[12],"in":[13],"administering":[14],"users,":[15],"it":[16],"is":[17],"still":[18],"needed":[19],"to":[20,44,73,93],"realize":[21],"notion":[23],"of":[24,60,64,79,99],"roles":[25],"at":[26],"resource":[28],"level.":[29],"In":[30],"this":[31],"paper,":[32],"we":[33,67],"propose":[34],"a":[35,69,84],"practical":[36],"cryptographic":[37],"RBAC":[38],"model,":[39,43],"called":[40],"role-key":[41,55],"hierarchy":[42],"support":[45],"various":[46],"security":[47],"features":[48],"including":[49],"signature":[50],"and":[51,77,88,97],"encryption":[52],"based":[53],"on":[54],"hierarchy.":[56],"With":[57],"rich":[61],"algebraic":[62],"structure":[63],"elliptic":[65],"curve,":[66],"introduce":[68],"cryptosystem":[71],"construction":[72],"verify":[74],"rationality":[76],"validity":[78],"our":[80,100],"proposed":[81],"model.":[82],"Also,":[83],"proof-of-concept":[85],"prototype":[86],"implementation":[87],"performance":[89],"evaluation":[90],"are":[91],"discussed":[92],"demonstrate":[94],"feasibility":[96],"efficiency":[98],"mechanisms.":[101]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":4},{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
