-
1
-
-
84909851650
-
Views for multilevel database security
-
D. E. Denning, S. F. Akl, M. Morgenstern and P. G. Neumann, "Views for multilevel database security, " Proceeding of IEEE symposium on Security & Privacy, pp. 156-172, 1986.
-
(1986)
Proceeding of IEEE Symposium on Security & Privacy
, pp. 156-172
-
-
Denning, D.E.1
Akl, S.F.2
Morgenstern, M.3
Neumann, P.G.4
-
4
-
-
84920472394
-
A security policy and formal top level specification for a multilevel secure local area network
-
J. McHugh and A. P. Morre, "A security policy and formal top level specification for a multilevel secure local area network." Proceedings of IEEE Symposium on Security & Privacy, pp. 34-39, 1986.
-
(1986)
Proceedings of IEEE Symposium on Security & Privacy
, pp. 34-39
-
-
McHugh, J.1
Morre, A.P.2
-
6
-
-
0023861378
-
A model for multilevel security in computer networks
-
W. P. Lu and M. K. Sundareshan, "A model for multilevel security in computer networks, " Proceedings of INFOCOM, pp. 1095-1104, 1988.
-
(1988)
Proceedings of INFOCOM
, pp. 1095-1104
-
-
Lu, W.P.1
Sundareshan, M.K.2
-
7
-
-
0003400251
-
Secure computer system: Unified exposition and multics interpretation
-
MITRE corp. Bedford, Mass., Mar
-
D. E. Bell and L. J. Lapadula, "Secure computer system: Unified exposition and multics interpretation, " Technical Report, NTR-2997, MITRE corp. Bedford, Mass., Mar. 1976.
-
(1976)
Technical Report, NTR-2997
-
-
Bell, D.E.1
Lapadula, L.J.2
-
8
-
-
0020778471
-
Scomp: A solution to multilevel security problem
-
July
-
L. J. Fraim, "Scomp: A solution to multilevel security problem, " IEEE Computer, pp. 26-143 July 1983.
-
(1983)
IEEE Computer
, pp. 26-143
-
-
Fraim, L.J.1
-
9
-
-
0020931264
-
Cryptographic solution to a multilevel security problem
-
Springer-Verlag
-
S. G. Akl and P. D. Taylor, "Cryptographic solution to a multilevel security problem, " Proceedings of CRYPTO'82, pp. 237-250, Springer-Verlag, 1983.
-
(1983)
Proceedings of CRYPTO'82
, pp. 237-250
-
-
Akl, S.G.1
Taylor, P.D.2
-
10
-
-
84976752387
-
Cryptographic solution to a problem of access control in a hierarchy
-
Aug.
-
S. G. Akl and P. D. Taylor, "Cryptographic solution to a problem of access control in a hierarchy, " ACM Transactions on computer Systems vol. 1, no. 3, Aug. 1983.
-
(1983)
ACM Transactions on Computer Systems
, vol.1
, Issue.3
-
-
Akl, S.G.1
Taylor, P.D.2
-
11
-
-
0017930809
-
A method for obtaining digital signature and public-key cryptosystems
-
R. L. Rivest, A. Shamir and L. Adleman, "A method for obtaining digital signature and public-key cryptosystems, " Communication ACM, vol. 21, no. 2, pp. 120-126, 1978.
-
(1978)
Communication ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
12
-
-
0022115074
-
An optimal algorithm for assigning cryptographic keys to access control in a hierarchy
-
Sept
-
S. J. MacKinnon, P. D. Taylor, H. Meijer and S. G. Akl, "An optimal algorithm for assigning cryptographic keys to access control in a hierarchy, " IEEE Transactions on Computers, C-34, pp. 797-802, Sept. 1985.
-
(1985)
IEEE Transactions on Computers
, vol.C-34
, pp. 797-802
-
-
MacKinnon, S.J.1
Taylor, P.D.2
Meijer, H.3
Akl, S.G.4
-
13
-
-
0023962708
-
Cryptographic Implementation of a tree hierarchy; for access control
-
R. S. Sandhu, "Cryptographic Implementation of a tree hierarchy; for access control" Information Processing Letters 27, pp. 95-98, 1988.
-
(1988)
Information Processing Letters
, vol.27
, pp. 95-98
-
-
Sandhu, R.S.1
-
14
-
-
0347160739
-
Flexible access control with master keys
-
Aug, The complete version to be published by Springer-Verlag
-
G. C. Chick and S. E. Tavares, "Flexible access control with master keys, " Abstract Proceedings of CRYPTO'89, pp. 297-303, Aug. 1989. (The complete version to be published by Springer-Verlag)
-
(1989)
Abstract Proceedings of CRYPTO'89
, pp. 297-303
-
-
Chick, G.C.1
Tavares, S.E.2
-
16
-
-
84919085619
-
An improved algorithm for computing logarithms over GF (P) and its cryptographic significance
-
S. Pohlig and M. E. Hellman, "An improved algorithm for computing logarithms over GF (P) and its cryptographic significance, " IEEE Transactions on Information Theory, vol. IT-24, pp. 106-110, 1978.
-
(1978)
IEEE Transactions on Information Theory
, vol.IT-24
, pp. 106-110
-
-
Pohlig, S.1
Hellman, M.E.2
-
17
-
-
0020180459
-
A conference key distribution system
-
I. Ingemarsson, D. T. Tang and C. K. Wong, " A conference key distribution system, " IEEE Trans., IT-28, pp. 714-720, 1982.
-
(1982)
IEEE Trans.
, vol.IT-28
, pp. 714-720
-
-
Ingemarsson, I.1
Tang, D.T.2
Wong, C.K.3
|