-
1
-
-
0022583299
-
Views of multilevel database seccurity
-
Oakland, CA, April 7-9
-
D.E. Denning, S.G. Akl, M. Morgenstern, P.G. Nermann. Views of multilevel database seccurity, Proc. IEEE Symp. on Security and Privacy, Oakland, CA, April 7-9, 1986, pp. 156-172.
-
(1986)
Proc. IEEE Symp. on Security and Privacy
, pp. 156-172
-
-
Denning, D.E.1
Akl, S.G.2
Morgenstern, M.3
Nermann, P.G.4
-
2
-
-
0021138526
-
Cryptographic checksums for multilevel database security
-
Oakland, CA. April 29-May 2
-
D.E. Denning, Cryptographic checksums for multilevel database security, Proc. IEEE Symp. on Security and Privacy, Oakland, CA. April 29-May 2, 1984, pp. 52-61.
-
(1984)
Proc. IEEE Symp. on Security and Privacy
, pp. 52-61
-
-
Denning, D.E.1
-
3
-
-
0019573099
-
A database encryption system with subkeys
-
G.I. Davida, D.L. Wells, J.B. Kam, A database encryption system with subkeys, ACM Trans. Database Systems 6(2) (1981) 312-328.
-
(1981)
ACM Trans. Database Systems
, vol.6
, Issue.2
, pp. 312-328
-
-
Davida, G.I.1
Wells, D.L.2
Kam, J.B.3
-
4
-
-
30244524130
-
Scomp: A solution to multilevel security problem
-
July
-
L.J. Fraim, Scomp: a solution to multilevel security problem, IEEE Computer, July (1983), 126-143.
-
(1983)
IEEE Computer
, pp. 126-143
-
-
Fraim, L.J.1
-
5
-
-
0006424880
-
-
The Benjamin/Cummings Publishing Company, Inc. Menlo Park, CA
-
M. Maekawa, A.E. Oldehoeft, R.R. Oldehoeft, Operating Systems -Advanced Concepts, The Benjamin/Cummings Publishing Company, Inc. Menlo Park, CA, 1987.
-
(1987)
Operating Systems -advanced Concepts
-
-
Maekawa, M.1
Oldehoeft, A.E.2
Oldehoeft, R.R.3
-
7
-
-
0022582820
-
A security policy and formal top level specification for a multilevel secure local area network
-
Oakland, CA, April 7-9
-
J. McHugh, A.P. Moore, A security policy and formal top level specification for a multilevel secure local area network, Proc. IEEE Symp. on Security and Privacy, Oakland, CA, April 7-9, 1986, pp. 43-39.
-
(1986)
Proc. IEEE Symp. on Security and Privacy
, pp. 43-139
-
-
McHugh, J.1
Moore, A.P.2
-
8
-
-
0023231848
-
Specifications for multilevel security and a hook-up property
-
Oakland, CA, April 27-29
-
D. McCullough, Specifications for multilevel security and a hook-up property, Proc. IEEE Symp. on Security and Privacy, Oakland, CA, April 27-29, 1987, pp. 161-166.
-
(1987)
Proc. IEEE Symp. on Security and Privacy
, pp. 161-166
-
-
McCullough, D.1
-
9
-
-
0023861378
-
A model for multilevel security in computer networks
-
New Orleans, LA, March
-
W.P. Lu, M.K. Sundareshaan, A model for multilevel security in computer networks, Proc. 1988 INFCOM, New Orleans, LA, March 1988, pp. 1095-1104.
-
(1988)
Proc. 1988 INFCOM
, pp. 1095-1104
-
-
Lu, W.P.1
Sundareshaan, M.K.2
-
10
-
-
84976752387
-
Cryptographic solution to a problem of access control in a hierarchy
-
S.G. Akl, P.D. Taylor, Cryptographic solution to a problem of access control in a hierarchy, ACM Trans, on Computer System 1(3) (1983) 239-247.
-
(1983)
ACM Trans, on Computer System
, vol.1
, Issue.3
, pp. 239-247
-
-
Akl, S.G.1
Taylor, P.D.2
-
11
-
-
0022115074
-
An optimal algorithm for assigning cryptographic keys to control access in a hierarchy
-
S.T. Mackinnon, P.D. Taylor, H. Meijer, S.G. Akl, An optimal algorithm for assigning cryptographic keys to control access in a hierarchy, IEE Trans. Computers C-34(9) (1985) 797-802.
-
(1985)
IEE Trans. Computers
, vol.C-34
, Issue.9
, pp. 797-802
-
-
Mackinnon, S.T.1
Taylor, P.D.2
Meijer, H.3
Akl, S.G.4
-
12
-
-
0000954459
-
A cryptographic keys generation scheme for multilevel data security
-
L. Harn, H.Y. Lin, A cryptographic keys generation scheme for multilevel data security, Computer Security 9 (1990) 539-546.
-
(1990)
Computer Security
, vol.9
, pp. 539-546
-
-
Harn, L.1
Lin, H.Y.2
-
13
-
-
0023962708
-
Cryptographic implementation of a tree hierarchy for access control
-
R.A. Sandu, Cryptographic implementation of a tree hierarchy for access control, Information Processing Letters 27 (1988) 95-98.
-
(1988)
Information Processing Letters
, vol.27
, pp. 95-98
-
-
Sandu, R.A.1
-
14
-
-
0001692137
-
Cryptographic key assignment scheme for access control in a hierarchy
-
C.C. Chang, R.J. Hwang, T.C. Wu, Cryptographic key assignment scheme for access control in a hierarchy, Information Systems 17(3) (1992) 243-247.
-
(1992)
Information Systems
, vol.17
, Issue.3
, pp. 243-247
-
-
Chang, C.C.1
Hwang, R.J.2
Wu, T.C.3
-
17
-
-
0029210438
-
A cryptographic implementation for dynamic access control in a user hierarchy
-
H.M. Tsai, C.C. Chang, A cryptographic implementation for dynamic access control in a user hierarchy, Computer and Security 14 (1995) 159-166.
-
(1995)
Computer and Security
, vol.14
, pp. 159-166
-
-
Tsai, H.M.1
Chang, C.C.2
-
18
-
-
0006425134
-
Assigning digital key pairs to determine relationships in a user hierarchy structure
-
C.C. Chang, H.T. Liaw, Assigning digital key pairs to determine relationships in a user hierarchy structure, Transactions of Information Processing Society of Japan 35(10) (1994) 2189-2196.
-
(1994)
Transactions of Information Processing Society of Japan
, vol.35
, Issue.10
, pp. 2189-2196
-
-
Chang, C.C.1
Liaw, H.T.2
-
19
-
-
0028422916
-
A scheme to determine the relationship between two users in a hierarchy
-
C.C. Chang, J.K. Jan, D.J. Buehrer, A scheme to determine the relationship between two users in a hierarchy, Computers and Security 13 (1994) 255-261.
-
(1994)
Computers and Security
, vol.13
, pp. 255-261
-
-
Chang, C.C.1
Jan, J.K.2
Buehrer, D.J.3
-
20
-
-
38249010116
-
Hierarchy representations based on arithmetic coding for dynamic information protection systems
-
C.H. Lin, C.C. Chang, R.C.T. Lee, Hierarchy representations based on arithmetic coding for dynamic information protection systems, Information Schemes 64 1-2 (1992) 35-48.
-
(1992)
Information Schemes
, vol.64
, Issue.1-2
, pp. 35-48
-
-
Lin, C.H.1
Chang, C.C.2
Lee, R.C.T.3
-
21
-
-
0002242788
-
A key management approach for access control in user hierarchies
-
Hsinchu, Taiwan
-
G. Horng, A key management approach for access control in user hierarchies, Proc. of International Computer Symposium, Hsinchu, Taiwan, 1994, pp. 439-444.
-
(1994)
Proc. of International Computer Symposium
, pp. 439-444
-
-
Horng, G.1
-
23
-
-
0006424599
-
Dynamic cryptographic key assignment schemes in a hierarchy
-
Taipei, Taiwan, May
-
H.T. Liaw, M.Y. Chiou, Dynamic cryptographic key assignment schemes in a hierarchy, Proceedings of the Fifth National Conference on Information Security, Taipei, Taiwan, May 1995, pp. 88-99.
-
(1995)
Proceedings of the Fifth National Conference on Information Security
, pp. 88-99
-
-
Liaw, H.T.1
Chiou, M.Y.2
|