Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
10340405 | Computer Standards & Interfaces | 2005 | 4 Pages |
Abstract
In this paper, we analyse the security of a cryptographic key assignment scheme, recently proposed by Huang and Chang, that is designed to provide time-constrained hierarchical access control. We show that the new scheme has potential security vulnerabilities, which enable malicious users and attackers to violate the privacy of other users.
Keywords
Related Topics
Physical Sciences and Engineering
Computer Science
Computer Networks and Communications
Authors
Qiang Tang, Chris J. Mitchell,