-
1
-
-
0016949746
-
A lattice model of secure information flow
-
Dorothy E. Denning. A lattice model of secure information flow. Communications of the ACM, 19(5):236-243, 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
2
-
-
0022583299
-
Views for multilevel database security
-
IEEE
-
D.E. Denning, S.G. Akl, M. Morgenstern, and P.G. Neumann. Views for multilevel database security. In 1986 IEEE Computer Society Symposium on Security and Privacy, pages 156-172. IEEE, 1986.
-
(1986)
1986 IEEE Computer Society Symposium on Security and Privacy
, pp. 156-172
-
-
Denning, D.E.1
Akl, S.G.2
Morgenstern, M.3
Neumann, P.G.4
-
3
-
-
0023861378
-
A model for multilevel security in computer networks
-
W.P. Lu and M.K. Sundareshan. A model for multilevel security in computer networks. In INFOCOM, pages 1095-1104, 1988.
-
(1988)
INFOCOM
, pp. 1095-1104
-
-
Lu, W.P.1
Sundareshan, M.K.2
-
4
-
-
85043778865
-
Membership authentication for hierarchical multi-groups using the extended Fiat-Sharnir scheme
-
Advances in Cryptology - Proceedings of CRYPTO 90
-
K. Ohta, T. Okamoto, and K. Koyama. Membership authentication for hierarchical multi-groups using the extended Fiat-Sharnir scheme. In Advances in Cryptology - Proceedings of CRYPTO 90, volume 473 of Lecture Notes in Computer Science, pages 446-457, 1991.
-
(1991)
Lecture Notes in Computer Science
, vol.473
, pp. 446-457
-
-
Ohta, K.1
Okamoto, T.2
Koyama, K.3
-
6
-
-
0020931264
-
Cryptographic solution in a multilevel security problem
-
Selim G. Akl and Peter D. Taylor. Cryptographic solution in a multilevel security problem. In CRYPTO '82, pages 237-459, 1983.
-
(1983)
CRYPTO '82
, pp. 237-459
-
-
Akl, S.G.1
Taylor, P.D.2
-
7
-
-
84976752387
-
Cryptographic solution to a problem of access control in a hierarchy
-
Selim G. Akl and Peter D. Taylor. Cryptographic solution to a problem of access control in a hierarchy. ACM Transactions on Computer Systems, 1(3):239-248, 1983.
-
(1983)
ACM Transactions on Computer Systems
, vol.1
, Issue.3
, pp. 239-248
-
-
Akl, S.G.1
Taylor, P.D.2
-
8
-
-
0022115074
-
An optimal algorithm for assigning cryptographic keys to control access in a hierarchy
-
Stephen J. MacKinnon, Peter D. Taylor, Henk Meijer, and Selim G. Akl. An optimal algorithm for assigning cryptographic keys to control access in a hierarchy. IEEE Transactions on Computers, 34(0):797-802, 1985.
-
(1985)
IEEE Transactions on Computers
, vol.34
, pp. 797-802
-
-
MacKinnon, S.J.1
Taylor, P.D.2
Meijer, H.3
Akl, S.G.4
-
9
-
-
0023962708
-
Cryptographic implementation of a tree hierarchy for access control
-
Ravi S. Sandhu. Cryptographic implementation of a tree hierarchy for access control, Information Processing Letters, 27(2):95-98, 1988.
-
(1988)
Information Processing Letters
, vol.27
, Issue.2
, pp. 95-98
-
-
Sandhu, R.S.1
-
10
-
-
84894043862
-
Flexible access control with master keys
-
Advances in Cryptology - Proceedings of CRYPTO 89
-
G.C. Chick and S.E. Tavares. Flexible access control with master keys. In Advances in Cryptology - Proceedings of CRYPTO 89, volume 435 of Lecture Notes in Computer Science, pages 316-322, 1990.
-
(1990)
Lecture Notes in Computer Science
, vol.435
, pp. 316-322
-
-
Chick, G.C.1
Tavares, S.E.2
-
11
-
-
0000954459
-
A cryptographic key generation scheme for multilevel data security
-
L. Ham and H.Y. Lin. A cryptographic key generation scheme for multilevel data security. Computers and Security, 9:539-546, 1990.
-
(1990)
Computers and Security
, vol.9
, pp. 539-546
-
-
Ham, L.1
Lin, H.Y.2
-
12
-
-
0004676563
-
A brach orientated key management solution to dynamic access control in a hierarchy
-
C.S. Laih and T. Hwang. A brach orientated key management solution to dynamic access control in a hierarchy. In IEEE Symposium on Applied Computing, pages 422-429, 1991.
-
(1991)
IEEE Symposium on Applied Computing
, pp. 422-429
-
-
Laih, C.S.1
Hwang, T.2
-
13
-
-
0001692137
-
Cryptographic key assignment scheme for access control in a hierarchy
-
C.C. Chang, R.J. Hwang, and T.C. Wu. Cryptographic key assignment scheme for access control in a hierarchy. Information Systems, 17(3):243-247, 1992.
-
(1992)
Information Systems
, vol.17
, Issue.3
, pp. 243-247
-
-
Chang, C.C.1
Hwang, R.J.2
Wu, T.C.3
-
14
-
-
38249003211
-
Access control in a hierarchy using a one-way trap door function
-
C.C. Chang and D.J. Buehrer. Access control in a hierarchy using a one-way trap door function. Computers and Mathematics with Applications, 26(5):71-76, 1993.
-
(1993)
Computers and Mathematics with Applications
, vol.26
, Issue.5
, pp. 71-76
-
-
Chang, C.C.1
Buehrer, D.J.2
-
16
-
-
0002360145
-
Controlling access in tree hierarchies
-
T.C. Wu and C.C. Chang. Controlling access in tree hierarchies. Information Sciences, 78:69-76, 1994.
-
(1994)
Information Sciences
, vol.78
, pp. 69-76
-
-
Wu, T.C.1
Chang, C.C.2
-
17
-
-
0029210438
-
A cryptographic implementation for dynamic access control in a user hierarchy
-
H.M. Tsai and C.C. Chang. A cryptographic implementation for dynamic access control in a user hierarchy. Computers and Security, 14:159-166, 1995.
-
(1995)
Computers and Security
, vol.14
, pp. 159-166
-
-
Tsai, H.M.1
Chang, C.C.2
-
18
-
-
0029292250
-
Dynamic access control scheme based on the chinese remainder theorem
-
T.C. Wu, T.S. Wu, and W.H. He. Dynamic access control scheme based on the chinese remainder theorem. Computer Systems Science and Engineering, (2):92-99, 1995.
-
(1995)
Computer Systems Science and Engineering
, vol.2
, pp. 92-99
-
-
Wu, T.C.1
Wu, T.S.2
He, W.H.3
-
19
-
-
0031344109
-
Dynamic key management schemes for access control in a hierarchy
-
C.H. Lin. Dynamic key management schemes for access control in a hierarchy. Computer Communications, 29:1381-1385, 1997.
-
(1997)
Computer Communications
, vol.29
, pp. 1381-1385
-
-
Lin, C.H.1
-
20
-
-
0031250999
-
Modified cryptographic key assignment scheme for a group-oriented user hierarchy
-
V.R.L. Shen, T.S. Chen, and F. Lai. Modified cryptographic key assignment scheme for a group-oriented user hierarchy. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E80-A(10):2032-2034, 1997.
-
(1997)
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
, vol.E80-A
, Issue.10
, pp. 2032-2034
-
-
Shen, V.R.L.1
Chen, T.S.2
Lai, F.3
-
21
-
-
0031248513
-
Novel cryptographic key assignment scheme for dynamic access control in a hierarchy
-
V.R.L. Shen, T.S. Chen, and F. Lai. Novel cryptographic key assignment scheme for dynamic access control in a hierarchy. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E80-A(10):2035-2037, 1997.
-
(1997)
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
, vol.E80-A
, Issue.10
, pp. 2035-2037
-
-
Shen, V.R.L.1
Chen, T.S.2
Lai, F.3
-
22
-
-
0032638189
-
Comments on 'dynamic key management schemes for access control in a hierarchy'
-
N.Y. Lee and T. Hwang. Comments on 'dynamic key management schemes for access control in a hierarchy'. Computer Communications, 22:87-89, 1999.
-
(1999)
Computer Communications
, vol.22
, pp. 87-89
-
-
Lee, N.Y.1
Hwang, T.2
-
23
-
-
84956999112
-
Chinese remainder theorem based hierarchical access control for secure group communication
-
ICICS '01
-
X. Zou, B. Ramamurthy, and S.S. Magliveras. Chinese remainder theorem based hierarchical access control for secure group communication. In ICICS '01, volume 2229 of Lecture Notes in Computer Science, pages 381-385, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2229
, pp. 381-385
-
-
Zou, X.1
Ramamurthy, B.2
Magliveras, S.S.3
-
24
-
-
0036222059
-
A novel key management scheme based on discrete logarithms and polynomial interpolations
-
V.R.L. Shen, T.S. Chen, and F. Lai. A novel key management scheme based on discrete logarithms and polynomial interpolations. Computers and Security, 21(2):164-171, 2002.
-
(2002)
Computers and Security
, vol.21
, Issue.2
, pp. 164-171
-
-
Shen, V.R.L.1
Chen, T.S.2
Lai, F.3
-
25
-
-
85029434541
-
Sibling intractable function families and their applications
-
Advances in Cryptology - Proceedings of Asiacrypt '91
-
Y. Zheng, T. Hardjono, and J. Pieprzvk. Sibling intractable function families and their applications. In Advances in Cryptology - Proceedings of Asiacrypt '91, volume 739 of Lecture Notes in Computer Science, pages 124-138, 1992.
-
(1992)
Lecture Notes in Computer Science
, vol.739
, pp. 124-138
-
-
Zheng, Y.1
Hardjono, T.2
Pieprzvk, J.3
-
26
-
-
79251578513
-
On the (im)possibility of obfuscating programs
-
Advances in Cryptology - Proceedings of CRYPTO 2001
-
Boaz Barak, Oded Goldreich, Russell Impagliazzo, Steven Rudich, Amit Sahai, Salil P. Vodhan, and Ke Yang. On the (im)possibility of obfuscating programs. In Advances in Cryptology - Proceedings of CRYPTO 2001, volume 2139 of Lecture Notes in Computer Science, pages 1-18, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2139
, pp. 1-18
-
-
Barak, B.1
Goldreich, O.2
Impagliazzo, R.3
Rudich, S.4
Sahai, A.5
Vodhan, S.P.6
Yang, K.7
-
27
-
-
85028838274
-
On the cryptopgrahic applications of random functions
-
Advances in Cryptology - Proceedings of CRYPTO 84
-
O. Goldreich, S. Goldwasser and S. Micali. On the cryptopgrahic applications of random functions. In Advances in Cryptology - Proceedings of CRYPTO 84, volume 196 of Lecture Notes in Computer Science, pages 276-288, 1985.
-
(1985)
Lecture Notes in Computer Science
, vol.196
, pp. 276-288
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
29
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
Advances in Cryptology - Proceedings of CRYPTO 86, Springer-Verlag
-
A. Fiat and A. Shamir. How to prove yourself: practical solutions to identification and signature problems. In Advances in Cryptology - Proceedings of CRYPTO 86, volume 263 of Lecture Notes in Computer Science, pages 186-194, Springer-Verlag, 1987.
-
(1987)
Lecture Notes in Computer Science
, vol.263
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
31
-
-
0003195066
-
The MD5 message-digest algorithm
-
R. Rivest. The MD5 message-digest algorithm. RFC 1321, 1992.
-
(1992)
RFC
, vol.1321
-
-
Rivest, R.1
-
32
-
-
0003629991
-
-
Federal information Processing Standards Publication 180-1
-
Federal information Processing Standards Publication 180-1. Secure hash standard, 1995.
-
(1995)
Secure hash standard
-
-
|