完整後設資料紀錄
DC 欄位語言
dc.contributor.authorWu, Tzong-Sun
dc.contributor.authorWu, Tzong-Chen
dc.date.accessioned2009-08-23T04:39:06Z
dc.date.accessioned2020-05-25T06:24:34Z-
dc.date.available2009-08-23T04:39:06Z
dc.date.available2020-05-25T06:24:34Z-
dc.date.issued2006-10-31T09:13:43Z
dc.date.submitted1996-12-12
dc.identifier.urihttp://dspace.lib.fcu.edu.tw/handle/2377/2946-
dc.description.abstractFollowing the Bell-Lapadula access access control model, it is only allowed that two users with the same security level in the hierarchy can communicate secretly with each other. Meanwhile, if it is necessary for security and law enforcement considerations, the contents of the secure communications between any two communicating users can be supervised (or eavesdropped) by the users wiht higher security level. Based on the usage of the tamperproof hardware and one-way hash function, we proposed a novel scheme to resolve hash function, we proposed a novels scheme to resolve the supervising problem stated above. By the proposed scheme, a session key shared by two users can be quickly established for secure communications. Also, this session key can be easily derived by the users with higher security level, and hence the supervising requirements can be achieved.
dc.description.sponsorship中山大學,高雄市
dc.format.extent6p.
dc.format.extent696942 bytes
dc.format.mimetypeapplication/pdf
dc.language.isozh_TW
dc.relation.ispartofseries1996 ICS會議
dc.subjectsupervising secure communications
dc.subjectlevel-based hierarchy
dc.subjecttamper-proof hardware
dc.subjectone-way hash function
dc.subject.otherMulti-level Security
dc.titleSupervising Srcure Communications for Level-Based Hierarchy
分類:1996年 ICS 國際計算機會議

文件中的檔案:
檔案 描述 大小格式 
ce07ics001996000255.pdf680.61 kBAdobe PDF檢視/開啟


在 DSpace 系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。