|
Volumn 14, Issue 2, 1995, Pages 159-166
|
A cryptographic implementation for dynamic access control in a user hierarchy
|
Author keywords
Access control; Cryptographic key; User hierarchy
|
Indexed keywords
COMPUTER NETWORKS;
DATA COMMUNICATION SYSTEMS;
HIERARCHICAL SYSTEMS;
INFORMATION TECHNOLOGY;
INTERPOLATION;
RESOURCE ALLOCATION;
SECURITY OF DATA;
USER INTERFACES;
CHINESE REMAINDER THEOREM;
DYNAMIC ACCESS CONTROL;
MULTI USER COMPUTER SYSTEM;
NEWTON'S METHOD;
RABIN PUBLIC KEY SYSTEM;
USER HIERARCHY;
CRYPTOGRAPHY;
|
EID: 0029210438
PISSN: 01674048
EISSN: None
Source Type: Journal
DOI: 10.1016/0167-4048(95)97049-G Document Type: Article |
Times cited : (39)
|
References (18)
|