-
1
-
-
84976752387
-
Cryptographic solution to a problem of access control in a hierarchy
-
S.G. Akl, P.D. Taylor, Cryptographic solution to a problem of access control in a hierarchy, ACM Transactions on Computer System 3 (1) (1983) 239-247.
-
(1983)
ACM Transactions on Computer System
, vol.3
, Issue.1
, pp. 239-247
-
-
Akl, S.G.1
Taylor, P.D.2
-
3
-
-
0001692137
-
A cryptographic key assignment scheme for access control in a hierarchy
-
C.C. Chang, R.J. Hwang, T.C. Wu, A cryptographic key assignment scheme for access control in a hierarchy, Information Systems 17 (3) (1992) 243-247.
-
(1992)
Information Systems
, vol.17
, Issue.3
, pp. 243-247
-
-
Chang, C.C.1
Hwang, R.J.2
Wu, T.C.3
-
4
-
-
84894043862
-
Flexible access control with master keys
-
Springer-Verlag, NY
-
G.C. Chick, S.E. Tavares, Flexible access control with master keys, in: Advances in Cryptology - CRYPTO '89, Springer-Verlag, NY, 1990, pp. 316-322.
-
(1990)
Advances in Cryptology - CRYPTO '89
, pp. 316-322
-
-
Chick, G.C.1
Tavares, S.E.2
-
5
-
-
0019573099
-
A database encryption system with subkeys
-
G.I. Davida, D.L. Wells, J.B. Kam, A database encryption system with subkeys, ACM Transactions on Database Systems 6 (2) (1981) 312-328.
-
(1981)
ACM Transactions on Database Systems
, vol.6
, Issue.2
, pp. 312-328
-
-
Davida, G.I.1
Wells, D.L.2
Kam, J.B.3
-
7
-
-
0022583299
-
Views for multilevel database security
-
Oakland, CA
-
D.E. Denning, S.G. Akl, M. Morgenstern, P.O. Neumann, Views for multilevel database security, in: Proceedings of 1986 IEEE on Security and Privacy, Oakland, CA, 1986, pp. 156-172.
-
(1986)
Proceedings of 1986 IEEE on Security and Privacy
, pp. 156-172
-
-
Denning, D.E.1
Akl, S.G.2
Morgenstern, M.3
Neumann, P.O.4
-
8
-
-
0021138526
-
Cryptographic checksums for multilevel database security
-
Oakland, CA
-
D.E. Denning, Cryptographic checksums for multilevel database security, in: Proceedings of 1984 IEEE on Security and Privacy, Oakland, CA, 1984, pp. 52-61.
-
(1984)
Proceedings of 1984 IEEE on Security and Privacy
, pp. 52-61
-
-
Denning, D.E.1
-
9
-
-
0020778471
-
A solution to multilevel security problem
-
L.J. Fraim, A solution to multilevel security problem, IEEE Computer (1983) 26-143.
-
(1983)
IEEE Computer
, pp. 26-143
-
-
Fraim, L.J.1
-
10
-
-
0000954459
-
A cryptographic key generation scheme for multilevel data security
-
L. Harn, H.Y. Lin, A cryptographic key generation scheme for multilevel data security, Computers & Security 9 (1990) 539-546.
-
(1990)
Computers & Security
, vol.9
, pp. 539-546
-
-
Harn, L.1
Lin, H.Y.2
-
11
-
-
0003657590
-
-
Addison-Wesley, Reading, MA
-
D.E. Knuth, The Art of Computer Programming, second ed., Addison-Wesley, Reading, MA, 1981.
-
(1981)
The Art of Computer Programming, Second Ed.
-
-
Knuth, D.E.1
-
12
-
-
0004676563
-
A branch oriented key management solution to dynamic access control in a hierarchy
-
C.S. Laih, T.L. Hwang, A branch oriented key management solution to dynamic access control in a hierarchy, IEEE Transactions on Software Engineering (1991) 422-429.
-
(1991)
IEEE Transactions on Software Engineering
, pp. 422-429
-
-
Laih, C.S.1
Hwang, T.L.2
-
13
-
-
0022115074
-
An optimal algorithm for assigning cryptographic keys to control access in a hierarchy
-
S.T. MacKinnon, P.D. Taylor, H. Meijer, S.G. Akl, An optimal algorithm for assigning cryptographic keys to control access in a hierarchy, IEEE Transactions on Computers 24 (9) (1985) 797-802.
-
(1985)
IEEE Transactions on Computers
, vol.24
, Issue.9
, pp. 797-802
-
-
MacKinnon, S.T.1
Taylor, P.D.2
Meijer, H.3
Akl, S.G.4
-
14
-
-
0023231848
-
Specifications for multilevel security and a hook-up property
-
Oakland, CA
-
D. McCullough, Specifications for multilevel security and a hook-up property, in: Proceedings of 1987, IEEE Symposium on Security and Privacy, Oakland, CA, 1987, pp. 161-166.
-
(1987)
Proceedings of 1987, IEEE Symposium on Security and Privacy
, pp. 161-166
-
-
McCullough, D.1
-
15
-
-
84920472394
-
A security policy and formal top level specification for a multilevel secure local area network
-
Oakland, CA
-
J. McHugh, A.P. Moore, A security policy and formal top level specification for a multilevel secure local area network, in: Proceedings of 1986, IEEE on Security and Privacy, Oakland, CA, 1986, pp. 34-39.
-
(1986)
Proceedings of 1986, IEEE on Security and Privacy
, pp. 34-39
-
-
McHugh, J.1
Moore, A.P.2
-
16
-
-
0003614758
-
Digitalized signatures and public-key function as intractable as factorization
-
IT Lab. Compt. Si
-
M.O. Rabin, Digitalized Signatures and Public-Key Function as Intractable as Factorization, Technical Report," IT/LCS/TR-212, IT Lab. Compt. Si. 1979.
-
(1979)
Technical Report
, vol.IT-LCS-TR-212
-
-
Rabin, M.O.1
-
18
-
-
0023962708
-
Cryptographic implementation of a tree hierarchy for access control
-
R.S. Sandhu, Cryptographic implementation of a tree hierarchy for access control, Information Processing Letter 27 (1988) 95-98.
-
(1988)
Information Processing Letter
, vol.27
, pp. 95-98
-
-
Sandhu, R.S.1
-
19
-
-
0029210438
-
A cryptographic implementation for dynamic access control in a user hierarchy
-
H.M. Tsai, C.C. Chang, A cryptographic implementation for dynamic access control in a user hierarchy, Computers and Security 14 (2) (1995) 857-959.
-
(1995)
Computers and Security
, vol.14
, Issue.2
, pp. 857-959
-
-
Tsai, H.M.1
Chang, C.C.2
-
20
-
-
0031248513
-
A novel cryptographic key assignment scheme for dynamic access control in a user hierarchy
-
V.R.L. Shen, T.-S. Chen, F. Lai, A novel cryptographic key assignment scheme for dynamic access control in a user hierarchy, IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences E80-A (10) (1997) 2035-2037.
-
(1997)
IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences
, vol.E80-A
, Issue.10
, pp. 2035-2037
-
-
Shen, V.R.L.1
Chen, T.-S.2
Lai, F.3
-
21
-
-
0029292250
-
Dynamic access control scheme based on the Chinese remainder theorem
-
T.C. Wu, T.S. Wu, W.H. He, Dynamic access control scheme based on the Chinese remainder theorem, Computer Systems Science and Engineering 10 (2) (1995) 92-99.
-
(1995)
Computer Systems Science and Engineering
, vol.10
, Issue.2
, pp. 92-99
-
-
Wu, T.C.1
Wu, T.S.2
He, W.H.3
-
22
-
-
0012951423
-
Public key cryptography
-
G. Simmons (Ed.), IEEE Press, Piscataway, NJ
-
J. Nechvatal, Public key cryptography, in: G. Simmons (Ed.), Contemporary Cryptology: The Science of Information Integrity, IEEE Press, Piscataway, NJ, 1992.
-
(1992)
Contemporary Cryptology: the Science of Information Integrity
-
-
Nechvatal, J.1
-
23
-
-
0031344109
-
Dynamic key management schemes for access control in a hierarchy
-
C.H. Lin, Dynamic key management schemes for access control in a hierarchy, Computer Communications 20 (1997) 1381-1385.
-
(1997)
Computer Communications
, vol.20
, pp. 1381-1385
-
-
Lin, C.H.1
-
24
-
-
0033334588
-
Cryptographic key assignment scheme for dynamic access control in a user hierarchy
-
F.H. Kuo, V.R.L. Shen, T.S. Chen, F. Lai, Cryptographic key assignment scheme for dynamic access control in a user hierarchy, IEE Proceedings on Computers & Digital Techniques 146 (5) (1999) 235-240.
-
(1999)
IEE Proceedings on Computers & Digital Techniques
, vol.146
, Issue.5
, pp. 235-240
-
-
Kuo, F.H.1
Shen, V.R.L.2
Chen, T.S.3
Lai, F.4
|