-
1
-
-
84976752387
-
Cryptographic solution to a problem of access control in a hierarchy
-
Akl S.G., Taylor P.D. Cryptographic solution to a problem of access control in a hierarchy. ACM Transactions on Computer Systems. 1(3):1983;239-248.
-
(1983)
ACM Transactions on Computer Systems
, vol.1
, Issue.3
, pp. 239-248
-
-
Akl, S.G.1
Taylor, P.D.2
-
2
-
-
0003400251
-
Secure computer systems: Unified exposition and multics interpretation
-
Hanscom Air Force Base Technical Report, Beford, MA
-
Bell, D., LaPadula, L., 1975. Secure computer systems: Unified exposition and multics interpretation. Technical Report ESD-TR-75-306, Hanscom Air Force Base Technical Report, Beford, MA.
-
(1975)
Technical Report
, vol.ESD-TR-75-306
-
-
Bell, D.1
LaPadula, L.2
-
3
-
-
0001692137
-
Cryptographic key assignment scheme for access control in a hierarchy
-
Chang C.C., Hwang R.J., Wu T.C. Cryptographic key assignment scheme for access control in a hierarchy. Information Systems. 17(3):1992;243-247.
-
(1992)
Information Systems
, vol.17
, Issue.3
, pp. 243-247
-
-
Chang, C.C.1
Hwang, R.J.2
Wu, T.C.3
-
4
-
-
0030192262
-
Parallel computation of the generating keys for RSA cryptosystems
-
Chang C.-C., Hwang M.-S. Parallel computation of the generating keys for RSA cryptosystems. IEE Electronics Letters. 32(15):1996;1365-1366.
-
(1996)
IEE Electronics Letters
, vol.32
, Issue.15
, pp. 1365-1366
-
-
Chang, C.-C.1
Hwang, M.-S.2
-
6
-
-
0008538346
-
A further weakness in the common modulus protocol for the RSA cryptosystem
-
DeLaurentis J.M. A further weakness in the common modulus protocol for the RSA cryptosystem. Cryptologia. 8(3):1984;253-259.
-
(1984)
Cryptologia
, vol.8
, Issue.3
, pp. 253-259
-
-
DeLaurentis, J.M.1
-
8
-
-
0022583299
-
Views for multilevel database security
-
Oakland
-
Denning, D.E., Akl, S.G., Morgenstern, M., Neumann, P.G., Schell, R.R., Heckman, M., 1986. Views for multilevel database security. In: Proceedings of the 1986 IEEE Symposium on Security and Privacy, Oakland, pp. 156-172.
-
(1986)
Proceedings of the 1986 IEEE Symposium on Security and Privacy
, pp. 156-172
-
-
Denning, D.E.1
Akl, S.G.2
Morgenstern, M.3
Neumann, P.G.4
Schell, R.R.5
Heckman, M.6
-
10
-
-
0020778471
-
Scomp: A solution to the multilevel security problem
-
Fraim L.J. Scomp: A solution to the multilevel security problem. IEEE Computer. 1983;26-34.
-
(1983)
IEEE Computer
, pp. 26-34
-
-
Fraim, L.J.1
-
11
-
-
0000954459
-
A cryptographic key generation scheme for multilevel data security
-
Harn L., Lin H.Y. A cryptographic key generation scheme for multilevel data security. Computers and Security. 9(6):1990;539-546.
-
(1990)
Computers and Security
, vol.9
, Issue.6
, pp. 539-546
-
-
Harn, L.1
Lin, H.Y.2
-
12
-
-
0031194544
-
A cryptographic key assignment scheme in a hierarchy for access control
-
Hwang M.-S. A cryptographic key assignment scheme in a hierarchy for access control. Mathematical and Computer Modelling. 26(2):1997;27-31.
-
(1997)
Mathematical and Computer Modelling
, vol.26
, Issue.2
, pp. 27-31
-
-
Hwang, M.-S.1
-
13
-
-
0032663530
-
Extension of CHW cryptographic key assignment scheme in a hierarchy
-
Hwang M.-S. Extension of CHW cryptographic key assignment scheme in a hierarchy. IEE Proceedings Computers and Digital Techniques. 146(4):1999;219.
-
(1999)
IEE Proceedings Computers and Digital Techniques
, vol.146
, Issue.4
, pp. 219
-
-
Hwang, M.-S.1
-
14
-
-
0012922503
-
An improvement of a dynamic cryptographic key assignment schemes in a tree hierarchy
-
Hwang M.-S. An improvement of a dynamic cryptographic key assignment schemes in a tree hierarchy. Computers and Mathematics with Applications. 37(3):1999;19-22.
-
(1999)
Computers and Mathematics with Applications
, vol.37
, Issue.3
, pp. 19-22
-
-
Hwang, M.-S.1
-
15
-
-
0033751899
-
An asymmetric cryptographic scheme for a totally-ordered hierarchy
-
Hwang M.-S. An asymmetric cryptographic scheme for a totally-ordered hierarchy. International Journal of Computer Mathematics. 73:2000;463-468.
-
(2000)
International Journal of Computer Mathematics
, vol.73
, pp. 463-468
-
-
Hwang, M.-S.1
-
16
-
-
0033908596
-
Cryptanalysis of YCN key assignment scheme in a hierarchy
-
Hwang M.-S. Cryptanalysis of YCN key assignment scheme in a hierarchy. Information Processing Letters. 73(3):2000;97-101.
-
(2000)
Information Processing Letters
, vol.73
, Issue.3
, pp. 97-101
-
-
Hwang, M.-S.1
-
18
-
-
0038564821
-
Cryptanalysis of the batch verifying multiple RSA digital signatures
-
Hwang M.-S., Lin I.-C., Hwang K.-F. Cryptanalysis of the batch verifying multiple RSA digital signatures. Informatica. 11(1):2000;15-19.
-
(2000)
Informatica
, vol.11
, Issue.1
, pp. 15-19
-
-
Hwang, M.-S.1
Lin, I.-C.2
Hwang, K.-F.3
-
19
-
-
0005695222
-
An optimal algorithm to assign cryptographic keys in a tree structure for access control
-
Liaw H.-T., Lei C.-L. An optimal algorithm to assign cryptographic keys in a tree structure for access control. BIT. 33:1993;46-56.
-
(1993)
BIT
, vol.33
, pp. 46-56
-
-
Liaw, H.-T.1
Lei, C.-L.2
-
21
-
-
0023861378
-
A model for multilevel security in computer networks
-
New Orleans, LA
-
Lu, W.P., Sundareshan, M.K., 1988. A model for multilevel security in computer networks. In: Proceedings of the 1988 INFOCOM, New Orleans, LA, pp. 1095-1104.
-
(1988)
Proceedings of the 1988 INFOCOM
, pp. 1095-1104
-
-
Lu, W.P.1
Sundareshan, M.K.2
-
22
-
-
0026853767
-
Enhanced protocols for hierarchical encryption key management for secure communication in internet environments
-
Lu W.P., Sundareshan M.K. Enhanced protocols for hierarchical encryption key management for secure communication in internet environments. IEEE Transactions on Communications. 40(4):1992;658-660.
-
(1992)
IEEE Transactions on Communications
, vol.40
, Issue.4
, pp. 658-660
-
-
Lu, W.P.1
Sundareshan, M.K.2
-
23
-
-
0022115074
-
An optimal algorithm for assigning cryptographic keys to control access in a hierarchy
-
Mackinnon S.J., Taylor P.D., Meijer H., Akl S.G. An optimal algorithm for assigning cryptographic keys to control access in a hierarchy. IEEE Transactions on Computers. 34(9):1985;797-802.
-
(1985)
IEEE Transactions on Computers
, vol.34
, Issue.9
, pp. 797-802
-
-
Mackinnon, S.J.1
Taylor, P.D.2
Meijer, H.3
Akl, S.G.4
-
25
-
-
0022582820
-
A security policy and formal top level specification for a multi-level secure local area network
-
Oakland
-
McHugh, J., Moore, A.P., 1986. A security policy and formal top level specification for a multi-level secure local area network. In: Proceedings of the 1986 IEEE Symposium on Security and Privacy, Oakland, pp. 34-39.
-
(1986)
Proceedings of the 1986 IEEE Symposium on Security and Privacy
, pp. 34-39
-
-
McHugh, J.1
Moore, A.P.2
-
27
-
-
0017930809
-
A method for obtaining digital signatures and public key cryptosystems
-
Rivest R.L., Shamir A., Adleman L. A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM. 21(2):1978;120-126.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
28
-
-
0023962708
-
Cryptographic implementation of a tree hierarchy for access control
-
Sandhu R.S. Cryptographic implementation of a tree hierarchy for access control. Information Processing Letters. 27:1988;95-98.
-
(1988)
Information Processing Letters
, vol.27
, pp. 95-98
-
-
Sandhu, R.S.1
-
30
-
-
0013024890
-
A key assignment for enforcing access control policy exceptions
-
Taipei
-
Yeh, J.H., Chow, R., Newman, R., 1998. A key assignment for enforcing access control policy exceptions. In: Proceedings on International Symposium on Internet Technology, Taipei, pp. 54-59.
-
(1998)
Proceedings on International Symposium on Internet Technology
, pp. 54-59
-
-
Yeh, J.H.1
Chow, R.2
Newman, R.3
|