-
1
-
-
84976752387
-
Cryptographic solution to a problem of access control in a hierarchy
-
Akl S. G., and Taylor P. D., 1983, Cryptographic Solution to a Problem of Access Control in a Hierarchy, "ACM Transactions on Computer System, "3(1), pp. 239-247.
-
(1983)
ACM Transactions on Computer System
, vol.3
, Issue.1
, pp. 239-247
-
-
Akl, S.G.1
Taylor, P.D.2
-
2
-
-
38249003211
-
Access control in a hierarchy using a one-way trapdoor function
-
Chang C. C., and Buehrer D. J., 1993, Access control in a Hierarchy Using a One-way Trapdoor Function, "Computers and Mathematics with Applications, " 26(5), pp. 71-76.
-
(1993)
Computers and Mathematics with Applications
, vol.26
, Issue.5
, pp. 71-76
-
-
Chang, C.C.1
Buehrer, D.J.2
-
3
-
-
0001692137
-
A cryptographic key assignment scheme for access control in a hierarchy
-
Chang C. C., Hwang, R. J., and Wu T. C., 1992, A Cryptographic Key Assignment Scheme for Access Control in a Hierarchy, "Information Systems," 17(3), pp. 243-247.
-
(1992)
Information Systems
, vol.17
, Issue.3
, pp. 243-247
-
-
Chang, C.C.1
Hwang, R.J.2
Wu, T.C.3
-
4
-
-
84894043862
-
Flexible access control with master keys
-
Springer-Verlag
-
Chick G. C., and Tavares S. E., 1990, Flexible Access Control with Master Keys, "In Advances in Cryptology - CRYPTO'89," Springer-Verlag, pp. 316-322.
-
(1990)
Advances in Cryptology - CRYPTO'89
, pp. 316-322
-
-
Chick, G.C.1
Tavares, S.E.2
-
5
-
-
0019573099
-
A database encryption system with subkeys
-
Davida G. I., Wells D. L., and Kam J. B., 1981, A Database Encryption System with Subkeys, "ACM Transactions on Database Systems," 6(2), pp. 312-328.
-
(1981)
ACM Transactions on Database Systems
, vol.6
, Issue.2
, pp. 312-328
-
-
Davida, G.I.1
Wells, D.L.2
Kam, J.B.3
-
7
-
-
0022583299
-
Views for multilevel database security
-
Oakland, CA
-
Denning D. E., Akl S. G., Morgenstern M., and Neumann P. G., 1986, Views for Multilevel Database Security, "Proc. 1986 IEEE on Security and Privacy," Oakland, CA, pp. 156-172.
-
(1986)
Proc. 1986 IEEE on Security and Privacy
, pp. 156-172
-
-
Denning, D.E.1
Akl, S.G.2
Morgenstern, M.3
Neumann, P.G.4
-
8
-
-
0020778471
-
A solution to multilevel security problem
-
Fraim L. J., 1983, A Solution to Multilevel Security Problem, "IEEE Computer," pp. 26-143.
-
(1983)
IEEE Computer
, pp. 26-143
-
-
Fraim, L.J.1
-
9
-
-
0000954459
-
A cryptographic key generation scheme for multilevel data security
-
Harn L., and Lin H. Y., 1990, A Cryptographic Key Generation Scheme for Multilevel Data Security, "Computers & Security," Vol. 9, pp. 539-546.
-
(1990)
Computers & Security
, vol.9
, pp. 539-546
-
-
Harn, L.1
Lin, H.Y.2
-
10
-
-
0003657590
-
-
Addison-Wesley, Reading, MA
-
Knuth D. E., 1981, "The Art of Computer Programming," Second Edition, Addison-Wesley, Reading, MA.
-
(1981)
"The Art of Computer Programming," Second Edition
-
-
Knuth, D.E.1
-
11
-
-
0022115074
-
An optimal algorithm for assigning cryptographic keys to control access in a hierarchy
-
MacKinnon S. T., Taylor P. D., Meijer H., and Akl S. G., 1985, An Optimal Algorithm for Assigning Cryptographic Keys to Control Access in a Hierarchy, "IEEE Transactions on Computers," 24(9), pp. 797-802.
-
(1985)
IEEE Transactions on Computers
, vol.24
, Issue.9
, pp. 797-802
-
-
MacKinnon, S.T.1
Taylor, P.D.2
Meijer, H.3
Akl, S.G.4
-
12
-
-
0023231848
-
Specifications for multilevel security and a hook-up property
-
Oakland, CA
-
McCullough D., 1987, Specifications for Multilevel Security and a Hook-up Property, Proc. 1987, "IEEE Symp. on Security and Privacy," Oakland, CA, 161-166.
-
(1987)
Proc. 1987, "IEEE Symp. on Security and Privacy"
, pp. 161-166
-
-
McCullough, D.1
-
13
-
-
84920472394
-
A security policy and formal top level specification for a multilevel secure local area network
-
Oakland, CA
-
McHugh J., and Moore A. P., 1986, A Security Policy and Formal Top Level Specification for a Multilevel Secure Local Area Network, Proc. 1986, "IEEE on Security and Privacy," Oakland, CA, pp. 34-39.
-
(1986)
Proc. 1986, "IEEE on Security and Privacy"
, pp. 34-39
-
-
McHugh, J.1
Moore, A.P.2
-
15
-
-
0023962708
-
Cryptographic implementation of a tree hierarchy for access control
-
Sandhu R. S., 1988, Cryptographic Implementation of a Tree Hierarchy for Access Control, "Information Processing Letter," Vol. 27, pp. 95-98.
-
(1988)
Information Processing Letter
, vol.27
, pp. 95-98
-
-
Sandhu, R.S.1
-
16
-
-
0029210438
-
A cryptographic implementation for dynamic access control in a user hierarchy
-
Tsai H. M., and Chang C. C., 1995, A Cryptographic Implementation for Dynamic Access Control in a User Hierarchy, "Computers and Security," 14(2), pp. 857-959.
-
(1995)
Computers and Security
, vol.14
, Issue.2
, pp. 857-959
-
-
Tsai, H.M.1
Chang, C.C.2
-
17
-
-
0031248513
-
A novel cryptographic key assignment scheme for dynamic access control in a user hierarchy
-
Victor R. L. Shen, Tzer-Shyong Chen, and Feipei Lai, 1997, A Novel Cryptographic Key Assignment Scheme for Dynamic Access Control in a User Hierarchy, "IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences," E80-A(10), pp. 2035-2037.
-
(1997)
IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences
, vol.E80-A
, Issue.10
, pp. 2035-2037
-
-
Shen, V.R.L.1
Chen, T.-S.2
Lai, F.3
-
19
-
-
0031344109
-
Dynamic key management schemes for access control in a hierarchy
-
Dec. 15
-
Lin, C.H., Dynamic Key Management Schemes for Access Control in a Hierarchy, "Computer Communications," Vol. 20, 15, Dec. 15, 1997, pp. 1381-1385.
-
(1997)
Computer Communications
, vol.20
, Issue.15
, pp. 1381-1385
-
-
Lin, C.H.1
-
20
-
-
0033334588
-
Cryptographic key assignment scheme for dynamic access control in a user hierarchy
-
Sept.
-
Kuo, F.H., Shen, V.R.L., Chen, T.S., and Lai, F, Cryptographic Key Assignment Scheme for Dynamic Access Control in a User Hierarchy, "IEE Proc. Computers & Digital Techniques," Vol. 146, No.5, Sept. 1999, pp. 235-240.
-
(1999)
IEE Proc. Computers & Digital Techniques
, vol.146
, Issue.5
, pp. 235-240
-
-
Kuo, F.H.1
Shen, V.R.L.2
Chen, T.S.3
Lai, F.4
|