%0 Conference Proceedings %T Constructing Key Assignment Schemes from Chain Partitions %+ Information Security Group, Royal Holloway %A Crampton, Jason %A Daud, Rosli %A Martin, Keith M. %< avec comité de lecture %( Lecture Notes in Computer Science %B 24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC) %C Rome, Italy %Y Sara Foresti; Sushil Jajodia %I Springer %3 Data and Applications Security and Privacy XXIV %V LNCS-6166 %P 130-145 %8 2010-06-21 %D 2010 %R 10.1007/978-3-642-13739-6_9 %Z Computer Science [cs]/Digital Libraries [cs.DL]Conference papers %X In considering a problem in access control for scalable multimedia formats, we have developed new methods for constructing key assignment schemes. Our first contribution is to improve an existing cryptographic access control mechanism for scalable multimedia formats. We then show how our methods can be applied to a chain partition to develop alternative mechanisms for scalable multimedia formats and how these methods can themselves be extended to create a new type of key assignment scheme. %G English %2 https://inria.hal.science/hal-01056664/document %2 https://inria.hal.science/hal-01056664/file/_39.pdf %L hal-01056664 %U https://inria.hal.science/hal-01056664 %~ IFIP-LNCS %~ IFIP %~ IFIP-LNCS-6166 %~ IFIP-TC %~ IFIP-WG %~ IFIP-TC11 %~ IFIP-WG11-3 %~ IFIP-DBSEC %~ IFIP-2010