-
5
-
-
0003103622
-
Protection (computer system access)
-
Lampson B. Protection (computer system access). Operating Systems Review 1974; 8(1): 18-24.
-
(1974)
Operating Systems Review
, vol.8
, Issue.1
, pp. 18-24
-
-
Lampson, B.1
-
6
-
-
0016949746
-
A lattice model of secure information flow
-
Denning DE. A lattice model of secure information flow. Communications of the ACM 1976; 19(5): 236-243.
-
(1976)
Communications of the ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
7
-
-
0027699087
-
Lattice-based access control model
-
Sandhu RS. Lattice-based access control model. IEEE Computer 1993; 26(11): 9-19.
-
(1993)
IEEE Computer
, vol.26
, Issue.11
, pp. 9-19
-
-
Sandhu, R.S.1
-
10
-
-
0242540377
-
RBAC for collaborative environments: Role-based access control for collaborative enterprise in peer-to-peer computing environments
-
Park JS, Hwang J. RBAC for collaborative environments: role-based access control for collaborative enterprise in peer-to-peer computing environments. In Proceedings of the Eighth ACM Symposium on Access Control Models and Technologies, 2003; 93-99.
-
(2003)
Proceedings of the Eighth ACM Symposium on Access Control Models and Technologies
, pp. 93-99
-
-
Park, J.S.1
Hwang, J.2
-
11
-
-
0030086382
-
Role-based access control models
-
Sandhu RS, Coyne EJ, Feinstein HL, Youman CE. Role-based access control models. IEEE Computer 1996; 29(2): 38-47.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
12
-
-
0344984336
-
A scalable key-management scheme with minimizing key storage for secure group communications
-
Tseng YM. A scalable key-management scheme with minimizing key storage for secure group communications. International Journal of Network Management 2003; 13(6): 419-425.
-
(2003)
International Journal of Network Management
, vol.13
, Issue.6
, pp. 419-425
-
-
Tseng, Y.M.1
-
16
-
-
84976752387
-
A cryptographic solution to the problem of access control in a hierarchy
-
Akl SG, Taylor PD. A cryptographic solution to the problem of access control in a hierarchy. ACM Transactions on Computer Systems 1983; 1(3): 239-248.
-
(1983)
ACM Transactions on Computer Systems
, vol.1
, Issue.3
, pp. 239-248
-
-
Akl, S.G.1
Taylor, P.D.2
-
17
-
-
0022115074
-
An optimal algorithm for assigning cryptographic keys to control access in a hierarchy
-
MacKinnon SJ, Taylor PD, Meijer H, Akl SG. An optimal algorithm for assigning cryptographic keys to control access in a hierarchy. IEEE Transactions on Computers 1985; 34(9): 797-802.
-
(1985)
IEEE Transactions on Computers
, vol.34
, Issue.9
, pp. 797-802
-
-
MacKinnon, S.J.1
Taylor, P.D.2
Meijer, H.3
Akl, S.G.4
-
18
-
-
84894043862
-
Flexible access control with master keys
-
Proceedings on Advances in Cryptology CRYPTO '89
-
Chick GC, Tavares SE. Flexible access control with master keys. In Proceedings on Advances in Cryptology (CRYPTO '89), LNCS 435, 1989; 316-322.
-
(1989)
LNCS
, vol.435
, pp. 316-322
-
-
Chick, G.C.1
Tavares, S.E.2
-
19
-
-
0031344109
-
Dynamic key management scheme for access control in a hierarchy
-
Lin CH. Dynamic key management scheme for access control in a hierarchy. Computer Communications 1997; 20(15): 1381-1385.
-
(1997)
Computer Communications
, vol.20
, Issue.15
, pp. 1381-1385
-
-
Lin, C.H.1
-
20
-
-
0023962708
-
Cryptographic implementation of a tree hierarchy for access control
-
Sandhu RS. Cryptographic implementation of a tree hierarchy for access control. Information Processing Letters 1988; 27(2): 95-98.
-
(1988)
Information Processing Letters
, vol.27
, Issue.2
, pp. 95-98
-
-
Sandhu, R.S.1
-
21
-
-
0036920852
-
A practical key management scheme for access control in a user hierarchy
-
Zhong S. A practical key management scheme for access control in a user hierarchy. Computers and Security 2002; 21(8): 750-759.
-
(2002)
Computers and Security
, vol.21
, Issue.8
, pp. 750-759
-
-
Zhong, S.1
-
22
-
-
18744363342
-
-
Chen TS, Chung YF, Tian CS. A novel key management scheme for dynamic access control in a user hierarchy. In International Computer Software and Applications Conference COMPSAC, 2004; 396-397
-
Chen TS, Chung YF, Tian CS. A novel key management scheme for dynamic access control in a user hierarchy. In International Computer Software and Applications Conference (COMPSAC), 2004; 396-397.
-
-
-
-
23
-
-
4444372561
-
An efficient key assignment for access control in large partially ordered hierarchy
-
Hwang MS, Liu CH, Lo JW. An efficient key assignment for access control in large partially ordered hierarchy. Journal of Systems and Software 2004; 73(3): 507-514.
-
(2004)
Journal of Systems and Software
, vol.73
, Issue.3
, pp. 507-514
-
-
Hwang, M.S.1
Liu, C.H.2
Lo, J.W.3
-
24
-
-
0036222059
-
A novel key management scheme based on discrete logarithms and polynomial interpolations
-
Shen VRL, Chen TS. A novel key management scheme based on discrete logarithms and polynomial interpolations. Computers and Security 2002; 21(2): 164-171.
-
(2002)
Computers and Security
, vol.21
, Issue.2
, pp. 164-171
-
-
Shen, V.R.L.1
Chen, T.S.2
-
25
-
-
33745792230
-
Hierarchical key management scheme using polynomial interpolation
-
Das ML, Saxena A, Gulati VP, Phatak DB. Hierarchical key management scheme using polynomial interpolation. SIGOPS Operating Systems Review 2005; 39(1): 40-47.
-
(2005)
SIGOPS Operating Systems Review
, vol.39
, Issue.1
, pp. 40-47
-
-
Das, M.L.1
Saxena, A.2
Gulati, V.P.3
Phatak, D.B.4
-
27
-
-
0000954459
-
A cryptographic key generation scheme for multilevel data security
-
Harn L, Lin HY. A cryptographic key generation scheme for multilevel data security. Computers and Security 1990; 9(6): 539-546.
-
(1990)
Computers and Security
, vol.9
, Issue.6
, pp. 539-546
-
-
Harn, L.1
Lin, H.Y.2
-
28
-
-
0001692137
-
Cryptographic key assignment scheme for access control in a hierarchy
-
Chang CC, Hwang RJ, Wu TC. Cryptographic key assignment scheme for access control in a hierarchy. Information Systems 1992; 17(3): 243-247.
-
(1992)
Information Systems
, vol.17
, Issue.3
, pp. 243-247
-
-
Chang, C.C.1
Hwang, R.J.2
Wu, T.C.3
-
31
-
-
2542477337
-
Scalable and lightweight key distribution for secure group communications
-
Lee FY, Shieh SP. Scalable and lightweight key distribution for secure group communications. International Journal of Network Management 2004; 14(3): 167-176.
-
(2004)
International Journal of Network Management
, vol.14
, Issue.3
, pp. 167-176
-
-
Lee, F.Y.1
Shieh, S.P.2
-
32
-
-
18844408349
-
Efficient authenticated key agreement protocols resistant to a denial-of-service attack
-
Tseng YM. Efficient authenticated key agreement protocols resistant to a denial-of-service attack. International Journal of Network Management 2005; 15(3): 193-202.
-
(2005)
International Journal of Network Management
, vol.15
, Issue.3
, pp. 193-202
-
-
Tseng, Y.M.1
-
34
-
-
0003400251
-
Secure computer systems: Mathematical foundations
-
Technical Report MTR2547, MLTRE Corporation: Bedford, MA
-
Bell D, LaPadula L. Secure computer systems: mathematical foundations. Technical Report MTR2547, MLTRE Corporation: Bedford, MA, 1973.
-
(1973)
-
-
Bell, D.1
LaPadula, L.2
|