Controlling access in large partially ordered hierarchies using cryptographic keys
暂无分享,去创建一个
[1] Min-Shiang Hwang. An asymmetric cryptographuic key assignment scheme for access control in totally-ordered hierarchies , 2000, Int. J. Comput. Math..
[2] Chin-Chen Chang,et al. Crypographic key assignment scheme for access control in a hierarchy , 1992, Inf. Syst..
[3] Selim G. Akl,et al. Cryptographic solution to a problem of access control in a hierarchy , 1983, TOCS.
[4] James A. Reeds,et al. Multilevel security in the UNIX tradition , 1992, Softw. Pract. Exp..
[5] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[6] John M. DeLaurentis,et al. A Further Weakness in the Common Modulus Protocol for the RSA Cryptoalgorithm , 1984, Cryptologia.
[7] Chin-Chen Chang,et al. Parallel computation of the generating keys for RSA cryptosystems , 1996 .
[8] C. Lei,et al. A dynamic cryptographic key assignment scheme in a tree structure , 1993 .
[9] Malur K. Sundareshan,et al. A Model for Multilevel Security in Computer Networks , 1990, IEEE Trans. Software Eng..
[10] D. Elliott Bell,et al. Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .
[11] Lein Harn,et al. A cryptographic key generation scheme for multilevel data security , 1990, Comput. Secur..
[12] Hwang Min-Shiang,et al. A cryptographic key assignment scheme in a hierarchy for access control , 1997 .
[13] Chin-Chen Chang,et al. Modified Chang-Hwang-Wu access control scheme , 1993 .
[14] Selim G. Akl,et al. Views for Multilevel Database Security , 1986, 1986 IEEE Symposium on Security and Privacy.
[15] Daryl McCullough,et al. Specifications for Multi-Level Security and a Hook-Up , 1987, 1987 IEEE Symposium on Security and Privacy.
[16] Ravi S. Sandhu,et al. Cryptographic Implementation of a Tree Hierarchy for Access Control , 1988, Inf. Process. Lett..
[17] Malur K. Sundareshan,et al. Enhanced protocols for hierarchical encryption key management for secure communication in internet environments , 1992, IEEE Trans. Commun..
[18] Min-Shiang Hwang. Cryptanalysis of YCN key assignment scheme in a hierarchy , 2000, Inf. Process. Lett..
[19] Min-Shiang Hwang. An improvement of a dynamic cryptographic key assignment scheme in a tree hierarchy , 1999 .
[20] Chin-Laung Lei,et al. An optimal algorithm to assign cryptographic keys in a tree structure for access control , 1993, BIT.
[21] Min-Shiang Hwang,et al. Cryptanalysis of the Batch Verifying Multiple RSA Digital Signatures , 2000, Informatica.
[22] Selim G. Akl,et al. An Optimal Algorithm for Assigning Cryptographic Keys to Control Access in a Hierarchy , 1985, IEEE Transactions on Computers.
[23] Chyi Hwang,et al. An FFT-based algorithm for 2D power series expansions , 1999 .
[24] John McHugh,et al. A Security Policy And Formal Top Level Specification For A Multi-Level Secure Local Area Network , 1986, 1986 IEEE Symposium on Security and Privacy.
[25] Dorothy E. Denning. Cryptographic Checksums for Multilevel Database Security , 1984, 1984 IEEE Symposium on Security and Privacy.
[26] L. J. Fraim. Scomp: A Solution to the Multilevel Security Problem , 1983, Computer.
[27] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[28] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[29] Min-Shiang Hwang. Extension of CHW cryptographic key assignment scheme in a hierarchy , 1999 .