Skip to main content
Advertisement
Browse Subject Areas
?

Click through the PLOS taxonomy to find articles in your field.

For more information about PLOS Subject Areas, click here.

< Back to Article

Fig 1.

A left-to-right and top-down policy-based partially ordered set (poset) within the hierarchical structure.

More »

Fig 1 Expand

Fig 2.

The classification levels based on taxonomic ranks.

More »

Fig 2 Expand

Table 1.

Comparison of principles hierarchical key assignment schemes.

More »

Table 1 Expand

Fig 3.

Orthogonal Projection: The closest vector to is the .

In other words, h is the nearest vector to f in W if and only if (fh) is orthogonal to all vectors in W.

More »

Fig 3 Expand

Fig 4.

Steps of the system-ready phase.

More »

Fig 4 Expand

Fig 5.

Workflow diagram for the proposed hierarchical key assignment scheme.

Steps 1a and 1b are grouped under the System-Ready Phase, followed by key derivation and dynamic rekeying with compromise detection.

More »

Fig 5 Expand

Table 2.

Memory and bandwidth benchmarks during key distribution.

More »

Table 2 Expand

Table 3.

Cost and trust summary for dynamic updates.

More »

Table 3 Expand

Fig 6.

Insertion of into the organization structure.

More »

Fig 6 Expand

Fig 7.

BAS with 4 Classification Levels (=c=15).

More »

Fig 7 Expand

Fig 8.

BAS with 5 Classification Levels (=c=31).

More »

Fig 8 Expand

Fig 9.

TAS with 4 Classification Levels (=c=40).

More »

Fig 9 Expand

Fig 10.

TAS with 5 Classification Levels (=c=121).

More »

Fig 10 Expand

Table 4.

Comparison with previous schemes.

More »

Table 4 Expand