-
1
-
-
85120101710
-
-
Denning, D.E., Akl, S.G. Morgenstern, M., and Neumann, P.G.: ‘Views for multilevel database security’, P roc. 1986 IEEE Symp. on Security and Privacy , Oakland, CA, 7–9 April 1986, pp. 156–172.
-
-
-
-
2
-
-
85120115761
-
-
Diffie, W. and Hellman, M.E.: ‘New directions in cryptography’, IEEE Transactions on Information Theory , 22, (6), 1976, pp. 644–654.
-
-
-
-
3
-
-
85120104840
-
-
Fraim, L.J.: ‘Scomp: a solution to multilevel security problem’, IEEE Transactions on Computers , C-16, (7), July 1983, pp. 126–143.
-
-
-
-
4
-
-
85120127754
-
-
Pohlig, S. and Hellman, M.E.: ‘An improved algorithm for computing logarithms over GF(P) and its cryptographic significance’, IEEE Transactions on Information Theory , IT-24, 1978, pp. 106–110.
-
-
-
-
5
-
-
85120142203
-
-
Sandhu, R. S.: ‘Cryptographic implementation of a tree hierarchy for access control’, Information Processing Letter , 27, 1988, pp. 95–98.
-
-
-
-
6
-
-
85120113795
-
-
Hwang, M.S., Yang, W.P., and Chang, C.C.: ‘Modified Chang-Hwang-Wu access control scheme’, Electronics Letters , 29, (24), 1993, pp.2095–2096.
-
-
-
-
7
-
-
85120115517
-
-
Akl, S.G.and Taylor, P.D.: ‘Cryptographic solution to a problem of access control in a hierarchy’, ACM Transactions on Computer System , 1, (3), 1983, pp. 239–247.
-
-
-
-
8
-
-
85120126434
-
-
MacKinnon, S.T., Taylor, P.D., Meijer, H., and Akl, S.G.: ‘An optimal algorithm for assigning cryptographic keys to control access in a hierarchy’, IEEE Transactions on Computers, C-34, (9), September 1985, pp. 797–802.
-
-
-
-
9
-
-
85120132239
-
-
Harn, L. and Lin, H.Y.: ‘A cryptographic key generation scheme for multilevel data security’, Computers & Security, 9, 1990, pp. 539–546.
-
-
-
-
10
-
-
85120112941
-
-
Shen, V.R.L., Chen, T.-S., and Lai, F.: ‘Modified cryptographic key assignment scheme for a group-oriented user hierarchy’, IEICE Trans. Fundamentals , E80-A, (10), October 1987, pp. 2032–2034.
-
-
-
-
11
-
-
85120122683
-
-
Shen, V.R.L., Chen, T.-S., and Lai, F.: ‘Novel cryptographic key assignment scheme for dynamic access control in a hierarchy’, IEICE Trans. Fundamentals, E80-A, (10), October 1987, pp. 2035–2037.
-
-
-
-
12
-
-
85120106570
-
-
Chang, C.C., Hwang, R.J., and Wu, T.C.: ‘Cryptographic key assignment scheme for access control in a hierarchy’, Information Systems, 17, (3), 1992, pp. 243–247.
-
-
-
-
13
-
-
85120140128
-
-
Chang, C.C. and Buehrer, D.J.: ‘Access control in a hierarchy using a one-way trapdoor function’, Computers and Mathematics with Applications, 26, (5), 1993, pp. 71–76.
-
-
-
-
14
-
-
85120106296
-
-
Chick, G.C. and Tavares, S.E.: ‘Flexible access control with master keys’, Advances in Cryptology — CRYPTO’89 , Springer-Verlag, 1990, pp. 316–322
-
-
-
-
15
-
-
85120145885
-
-
Tsai, H.M. and Chang, C.C.: ‘A cryptographic implementation for dynamic access control in a user hierarchy’, Computers & Security , 14, (2), 1995, pp. 857–959.
-
-
-
-
16
-
-
85120142308
-
-
Laih, C.S. and Hwang, T.L.: ‘A branch oriented key management solution to dynamic access control in a hierarchy’, IEEE Symposium on Applied Computing, 1991, pp.422–429.
-
-
-
-
17
-
-
85120120542
-
-
Wu, T.C. and Chang, C.C.: ‘Controlling access in tree hierarchies’, Information Sciences, 78, 1994, pp. 69–76.
-
-
-
-
18
-
-
85120122102
-
-
Wu, T.C., Wu, T.S., and He, W.H.: ‘Dynamic access control scheme based on the Chinese remainder theorem’, Computer System Science and Engineering , 10, (2), 1995, pp. 92–99.
-
-
-
-
19
-
-
85120120716
-
-
McCullough, D.: ‘Specifications for multilevel security and a hook-up property’, Proc. 1987 IEEE Symp. on Security and Privacy , April 27–29, 1987, Oakland, CA, pp. 161–166.
-
-
-
-
20
-
-
85120126417
-
-
Shen, V.R.L., Chen, T.-S., and Lai, F.: ‘A cryptographic key assignment scheme for dynamic access control in a user hierarchy’, I EE Procs. Computers and Digital Techniques, 1 46, (5), September 1999, pp. 235–240.
-
-
-
-
21
-
-
85120099217
-
-
Lin C.H.: ‘Dynamic key management schemes for access control in a hierarchy’, Computer Communications, 20, 1997, pp. 1381–1385.
-
-
-
-
22
-
-
85120092326
-
-
Lee, N.Y. and Hwang, T.: ‘Comments on dynamic key management schemes for access in a hierarchy’, Computer Communications , 22, 1999, pp. 87–89.
-
-
-
-
23
-
-
85120094575
-
-
Knuth, D.E. The Art of Computer Programming, Vol. 2, Seminumerical Algorithms , Second Edition, Addison-Wesley, Reading, MA, 1981.
-
-
-
|