-
1
-
-
84976752387
-
Cryptographic solution to a problem of access control in a hierarchy
-
Akl S.G., Taylor P.D. Cryptographic solution to a problem of access control in a hierarchy. ACM Transactions on Computer Systems. 1(3):1983;239-248.
-
(1983)
ACM Transactions on Computer Systems
, vol.1
, Issue.3
, pp. 239-248
-
-
Akl, S.G.1
Taylor, P.D.2
-
2
-
-
0022115074
-
An optimal algorithm for assigning cryptographic keys to control access in a hierarchy
-
Mackinnon S.J., Taylor P.D., Heijer H., Akl S.G. An optimal algorithm for assigning cryptographic keys to control access in a hierarchy. IEEE Transactions on Computers. 34(9):1985;797-802.
-
(1985)
IEEE Transactions on Computers
, vol.34
, Issue.9
, pp. 797-802
-
-
Mackinnon, S.J.1
Taylor, P.D.2
Heijer, H.3
Akl, S.G.4
-
3
-
-
0023962708
-
Cryptographic implementation of a tree hierarchy for access control
-
Sandhu R.S. Cryptographic implementation of a tree hierarchy for access control. Information Processing Letters. 27:1988;95-98.
-
(1988)
Information Processing Letters
, vol.27
, pp. 95-98
-
-
Sandhu, R.S.1
-
4
-
-
0000954459
-
A cryptographic key generation scheme for multilevel data security
-
Harn L., Lin H.Y. A cryptographic key generation scheme for multilevel data security. Computers and Security. 9(6):1990;539-546.
-
(1990)
Computers and Security
, vol.9
, Issue.6
, pp. 539-546
-
-
Harn, L.1
Lin, H.Y.2
-
5
-
-
0001692137
-
Cryptographic key assignment scheme for access control in a hierarchy
-
Chang C.C., Hwang R.J., Wu T.C. Cryptographic key assignment scheme for access control in a hierarchy. Information Systems. 17(3):1992;243-247.
-
(1992)
Information Systems
, vol.17
, Issue.3
, pp. 243-247
-
-
Chang, C.C.1
Hwang, R.J.2
Wu, T.C.3
-
6
-
-
0030104563
-
Crypto backup and key escrow
-
Maher D.P. Crypto backup and key escrow. Communications of the ACM. 39(3):1996;48-53.
-
(1996)
Communications of the ACM
, vol.39
, Issue.3
, pp. 48-53
-
-
Maher, D.P.1
-
7
-
-
0033334588
-
Cryptographic key assignment scheme for dynamic access control in a user hierarchy
-
Sept.
-
Kuo F.H., Shen V.R.L., Chen T.S., Lai F. Cryptographic key assignment scheme for dynamic access control in a user hierarchy. IEE Proceedings. Computers and Digital Techniques. 146(5):Sept. 1999;235-240.
-
(1999)
IEE Proceedings. Computers and Digital Techniques
, vol.146
, Issue.5
, pp. 235-240
-
-
Kuo, F.H.1
Shen, V.R.L.2
Chen, T.S.3
Lai, F.4
-
8
-
-
0036187601
-
A time-bound cryptographic key assignment scheme for access control in a hierarchy
-
Jan/Feb
-
Tzeng W.G. A time-bound cryptographic key assignment scheme for access control in a hierarchy. IEEE Transactions on Knowledge and Data Engineering. 14(1):Jan/Feb 2002;182-188.
-
(2002)
IEEE Transactions on Knowledge and Data Engineering
, vol.14
, Issue.1
, pp. 182-188
-
-
Tzeng, W.G.1
-
9
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
February
-
Rivest R.L., Shamir A., Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM. 21(2):February 1978;120-126.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
10
-
-
0742293405
-
Security of Tzeng's time-bound key assignment scheme for access control in a hierarchy
-
Yi X. Security of Tzeng's time-bound key assignment scheme for access control in a hierarchy. to appear in IEEE Transactions on Knowledge and Data Engineering. 2002.
-
(2002)
IEEE Transactions on Knowledge and Data Engineering
-
-
Yi, X.1
|