-
1
-
-
84976752387
-
Cryptographic solution to a problem of access control in a hierarchy
-
Aug. doi:10.1145/357369.357372
-
S.G. Akl, P.D. Taylor, "Cryptographic Solution to a Problem of Access Control in a Hierarchy." ACM Transactions on Computer System,vol. 1., Aug.1983, pp. 239-248, doi:10.1145/357369.357372
-
(1983)
ACM Transactions on Computer System
, vol.1
, pp. 239-248
-
-
Akl, S.G.1
Taylor, P.D.2
-
2
-
-
0022115074
-
An optimal algorithm for assigning cryptographic keys to control access in a hierarchy
-
Sep., doi:10.1109/TC.1985.1676635
-
S.J. Mackinnon, P.D. Taylor, H. Meijer, and S.G. Akl, "An optimal algorithm for assigning cryptographic keys to control access in a hierarchy" IEEE Transaction on Computers, vol.34, Sep. 1985, pp.789-802, doi:10.1109/TC.1985.1676635
-
(1985)
IEEE Transaction on Computers
, vol.34
, pp. 789-802
-
-
Mackinnon, S.J.1
Taylor, P.D.2
Meijer, H.3
Akl, S.G.4
-
3
-
-
0023962708
-
CRYPTOGRAPHIC IMPLEMENTATION OF A TREE HIERARCHY FOR ACCESS CONTROL.
-
DOI 10.1016/0020-0190(88)90099-3
-
R. S. Sandhu, "Cryptographic Implementation of a Tree Hierarchy for Access Control", Information Processing Letters, vol.27, Feb.1988, pp.95-98, doi: 10.1016/0020-0190(88)90099-3 (Pubitemid 18588349)
-
(1988)
Information Processing Letters
, vol.27
, Issue.2
, pp. 95-98
-
-
Sandhu Ravinderpal, S.1
-
4
-
-
0000954459
-
A cryptographic key generation scheme for multilevel data security
-
Oct., doi: 10.1016/0167-4048(90)90132-D
-
L. Harn and H. Y. Lin, "A Cryptographic Key Generation Scheme for Multilevel Data Security," Computer and Security, vol.9,Oct.1990, pp.539-546, doi: 10.1016/0167-4048(90)90132-D
-
(1990)
Computer and Security
, vol.9
, pp. 539-546
-
-
Harn, L.1
Lin, H.Y.2
-
5
-
-
0013024890
-
A key assignment for enforcing access control policy exceptions
-
Feb
-
J. H. Yeh, R. Chow, and R.Newman, " A Key Assignment for Enforcing Access Control Policy Exceptions", Proc. on International Symposium on Internet Technology, Feb.1998, pp.54-59
-
(1998)
Proc. on International Symposium on Internet Technology
, pp. 54-59
-
-
Yeh, J.H.1
Chow, R.2
Newman, R.3
-
6
-
-
0012922503
-
An improvement of a dynamic cryptographic key assignment schemes in a tree hierarchy
-
Feb., doi:10.1016/S0898-1221(99)00042-5
-
M. S. Hwang, " An Improvement of a Dynamic Cryptographic Key Assignment Schemes in a Tree Hierarchy", Computers & Mathematics with Application,s, vol. 37, Feb.1999, pp.19-22, doi: 10.1016/S0898-1221(99)00042-5
-
(1999)
Computers & Mathematics with Application,s
, vol.37
, pp. 19-22
-
-
Hwang, M.S.1
-
7
-
-
0036222059
-
A novel key management scheme based on discrete logarithms and polynomial interpolations
-
DOI 10.1016/S0167-4048(02)00211-0
-
R. L. Victor and T. S. Chen, " A Novel Key Management Scheme Based on Discrete Logarithms and Polynomial Interpolations," Computer and Security, vol. 21, March 2002, pp.164-171, doi:10.1016/S0167-4048(02)00211-0 (Pubitemid 34288358)
-
(2002)
Computers and Security
, vol.21
, Issue.2
, pp. 164-171
-
-
Shen, V.R.L.1
Chen, T.-S.2
-
8
-
-
0038103896
-
Cryptanaylsis and improvements of two cryptographic key assignment schemes for dynamic access control in a user hierarchy
-
July, doi:10.1016/S0167-4048(03)00514-5
-
C. L. Hsu and T. S. Wu, "Cryptanaylsis and Improvements of Two Cryptographic Key Assignment Schemes for Dynamic Access Control in a User Hierarchy", Computer & Secrity, vol. 22, July, pp.452-456, doi:10.1016/S0167-4048(03)00514-5
-
Computer & Secrity
, vol.22
, pp. 452-456
-
-
Hsu, C.L.1
Wu, T.S.2
-
9
-
-
0038053203
-
Controlling access in large partially ordered hierarchies using cryptographic keys
-
Aug., doi: 10.1016/S0164-1212(02)00091-2
-
M. S. Hwang and W. P. Yang " Controlling Access in Large Partially Ordered Hierarchies Using Cryptographic Keys." The Journal of Systemes and Software, vol67, Aug.2003, pp: 99-107, doi: 10.1016/S0164-1212(02)00091-2
-
(2003)
The Journal of Systemes and Software
, vol.67
, pp. 99-107
-
-
Hwang, M.S.1
Yang, W.P.2
-
10
-
-
9544234465
-
Cryptanalysis of wang-yang scheme for controlling access in large partially ordered hierarchies
-
Feb., doi:10.1016/j.jss.2004.04.015
-
S. Y. Wang, C. S. Laih "Cryptanalysis of Wang-Yang Scheme for Controlling Access in Large Partially Ordered Hierarchies", The Journal of System and Software, vol75, Feb.2005, pp :189-192, doi:10.1016/j.jss.2004.04.015
-
(2005)
The Journal of System and Software
, vol.75
, pp. 189-192
-
-
Wang, S.Y.1
Laih, C.S.2
-
11
-
-
0033751899
-
An asymmetric cryptographic scheme for a totally- ordered hierarchy
-
Oct., doi: 10.1080/00207160008804909
-
M. S. Huang "An Asymmetric Cryptographic Scheme for a Totally- ordered Hierarchy." International Journal of Computer Mathematics vol.73,Oct.2000, pp: 463-468, doi: 10.1080/00207160008804909
-
(2000)
International Journal of Computer Mathematics
, vol.73
, pp. 463-468
-
-
Huang, M.S.1
|