-
1
-
-
0020931264
-
Cryptographic solution to a multilevel security problem
-
In D. Chaum, R. L. Rivest, and A. T. Sherman, editors; Plenum Press, NY, August
-
S. G. Akl and P. D. Taylor. Cryptographic Solution to a Multilevel Security Problem. In D. Chaum, R. L. Rivest, and A. T. Sherman, editors, Advances in Cryptology: Proceedings of CRYPTO '82, pages 237-249. Plenum Press, NY, August 1982.
-
(1982)
Advances in Cryptology: Proceedings of CRYPTO '82
, pp. 237-249
-
-
Akl, S.G.1
Taylor, P.D.2
-
2
-
-
84976752387
-
Cryptographic solution to a problem of access control in a hierarchy
-
S. G. Akl and P. D. Taylor. Cryptographic Solution to a Problem of Access Control in a Hierarchy. ACM Transactions on Computer Systems, 1(3):239-248, 1983.
-
(1983)
ACM Transactions on Computer Systems
, vol.1
, Issue.3
, pp. 239-248
-
-
Akl, S.G.1
Taylor, P.D.2
-
4
-
-
0004190705
-
-
Addison-Wesley, Reading, MA
-
S. Castano, M. Fugini, G. Martella, and P. Samarati. Database Security. Addison-Wesley, Reading, MA, 1994.
-
(1994)
Database Security
-
-
Castano, S.1
Fugini, M.2
Martella, G.3
Samarati, P.4
-
5
-
-
0003683288
-
High-speed RSA implementation
-
Technical Report TR 201, RSA Laboratories, RSA Data Security, Inc., Nov.
-
Ç. Koç. High-Speed RSA Implementation. Technical Report TR 201, RSA Laboratories, RSA Data Security, Inc., Nov. 1994.
-
(1994)
-
-
Koç, Ç.1
-
6
-
-
84894043862
-
Flexible access control with master keys
-
In G. Brassard, editor; Springer-Verlag
-
G. C. Chick and S. E. Tavares. Flexible Access Control with Master Keys. In G. Brassard, editor, Advances in Cryptology: Proceedings of Crypto '89, volume 435 of Lecture Notes in Computer Science, pages 316-322. Springer-Verlag, 1990.
-
(1990)
Advances in Cryptology: Proceedings of Crypto '89, Volume 435 of Lecture Notes in Computer Science
, pp. 316-322
-
-
Chick, G.C.1
Tavares, S.E.2
-
7
-
-
0242528839
-
Discretionary access control in structurally object-oriented database systems
-
Elsevier Science, North Holland
-
K. R. Dittrich, M. Hartig, and H. Pfefferle. Discretionary Access Control in Structurally Object-Oriented Database Systems. In Database Security II: Status and Prospects, IFIP, pages 105-121. Elsevier Science, North Holland, 1989.
-
(1989)
Database Security II: Status and Prospects, IFIP
, pp. 105-121
-
-
Dittrich, K.R.1
Hartig, M.2
Pfefferle, H.3
-
9
-
-
0000954459
-
A cryptographic key generation scheme for multi-level data security
-
L. Harn and H. Y. Lin. A Cryptographic Key Generation Scheme for Multi-level Data Security. Computer & Security, 9(6):539-546, 1990.
-
(1990)
Computer & Security
, vol.9
, Issue.6
, pp. 539-546
-
-
Harn, L.1
Lin, H.Y.2
-
10
-
-
0242445290
-
The secure use of RSA
-
B. Kaliski and M. Robshaw. The Secure Use of RSA. CryptoBytes, 1(3):7-13, 1995.
-
(1995)
CryptoBytes
, vol.1
, Issue.3
, pp. 7-13
-
-
Kaliski, B.1
Robshaw, M.2
-
11
-
-
0242528842
-
Security policies in object-oriented databases
-
Elsevier Science, North Holland
-
M. Larrondo-Petrie, E. Gudes, H. Song, and E. B. Fernandez. Security Policies in Object-Oriented Databases. In Database Security III, IFIP, pages 257-269. Elsevier Science, North Holland, 1990.
-
(1990)
Database Security III, IFIP
, pp. 257-269
-
-
Larrondo-Petrie, M.1
Gudes, E.2
Song, H.3
Fernandez, E.B.4
-
12
-
-
0022115074
-
An optimal algorithm for assigning cryptographic keys to access control in a hierarchy
-
S. J. MacKinnon, P. D. Taylor, H. Meijer, and S. G. Akl. An Optimal Algorithm for Assigning Cryptographic Keys to Access Control in a Hierarchy. IEEE Transactions on Computers, C-34(9):797-802, 1985.
-
(1985)
IEEE Transactions on Computers
, vol.C-34
, Issue.9
, pp. 797-802
-
-
MacKinnon, S.J.1
Taylor, P.D.2
Meijer, H.3
Akl, S.G.4
-
14
-
-
0242697685
-
Membership authentication for hierarchical multigroup using the extended fiat-shamir scheme
-
In I. B. Damgå, editor; Springer-Verlag
-
K. Ohta, T. Okamoto, and K. Koyama. Membership Authentication for Hierarchical Multigroup using the Extended Fiat-Shamir Scheme. In I. B. Damgå, editor, Advances in Cryptology: Proceedings of EuroCrypt '90, volume 473 of Lecture Notes in Computer Science, pages 316-322. Springer-Verlag, 1991.
-
(1991)
Advances in Cryptology: Proceedings of EuroCrypt '90, Volume 473 of Lecture Notes in Computer Science
, pp. 316-322
-
-
Ohta, K.1
Okamoto, T.2
Koyama, K.3
-
15
-
-
0242613535
-
Information security policy
-
In M. D. Abrams, S. Jajodia, and H. J. Podell, editors; IEEE Computer Society Press
-
I. M. Olson and M. D. Abrams. Information Security Policy. In M. D. Abrams, S. Jajodia, and H. J. Podell, editors, Information Security: An Integrated Collection of Essays, pages 160-169. IEEE Computer Society Press, 1995.
-
(1995)
Information Security: An Integrated Collection of Essays
, pp. 160-169
-
-
Olson, I.M.1
Abrams, M.D.2
-
16
-
-
0026119329
-
A model of authorization for next-generation database systems
-
March
-
F. Rabitti, E. Bertino, W. Kim, and D. Woelk. A Model of Authorization for Next-Generation Database Systems. ACM Transactions on Database Systems, 16(1):88-131, March 1991.
-
(1991)
ACM Transactions on Database Systems
, vol.16
, Issue.1
, pp. 88-131
-
-
Rabitti, F.1
Bertino, E.2
Kim, W.3
Woelk, D.4
-
17
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R. L. Rivest, A. Shamir, and L. Adleman. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, 21(2):627-647, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 637-647
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
18
-
-
0023962708
-
Cryptographic implementation of a tree hierarchy for access control
-
R. S. Sandhu. Cryptographic Implementation of a Tree Hierarchy for Access Control. Information Processing Letters, 27(2):95-98, 1988.
-
(1988)
Information Processing Letters
, vol.27
, Issue.2
, pp. 95-98
-
-
Sandhu, R.S.1
-
21
-
-
84976740459
-
Mandatory security in object-oriented database systems
-
New Orleans, LA, October
-
M. B. Thuraisingham. Mandatory Security in Object-Oriented Database Systems. In Proceedings of the International Conference on Object-Oriented Programming Systems, Languages and Applications, pages 203-210, New Orleans, LA, October 1989.
-
(1989)
Proceedings of the International Conference on Object-Oriented Programming Systems, Languages and Applications
, pp. 203-210
-
-
Thuraisingham, M.B.1
-
23
-
-
4243480270
-
New solutions to the problem of access control in a hierarchy
-
Technical Report Preprint 93-2, Department of Computer Science, University of Wollongong, February
-
Y. Zheng, T. Hardjono, and J. Seberry. New Solutions to the Problem of Access Control in a Hierarchy. Technical Report Preprint 93-2, Department of Computer Science, University of Wollongong, February 1993, Available from http://citeseer.nj.com/28503.html.
-
(1993)
-
-
Zheng, Y.1
Hardjono, T.2
Seberry, J.3
|