A novel key management scheme for dynamic access control in a user hierarchy
暂无分享,去创建一个
[1] C T Dinardo,et al. Computers and security , 1986 .
[2] Chin-Chen Chang,et al. Crypographic key assignment scheme for access control in a hierarchy , 1992, Inf. Syst..
[3] Daryl McCullough,et al. Specifications for Multi-Level Security and a Hook-Up , 1987, 1987 IEEE Symposium on Security and Privacy.
[4] Feipei Lai,et al. Novel Cryptographic Key Assignment Scheme for Dynamic Access Control in a Hierarchy , 1997 .
[5] F. Kuo,et al. Cryptographic key assignment scheme for dynamic access control in a user hierarchy , 1999 .
[6] Selim G. Akl,et al. An Optimal Algorithm for Assigning Cryptographic Keys to Control Access in a Hierarchy , 1985, IEEE Transactions on Computers.
[7] Tsai Hui-Min,et al. Refereed paper: A cryptographic implementation for dynamic access control in a user hierarchy , 1995 .
[8] John B. Kam,et al. A database encryption system with subkeys , 1981, TODS.
[9] Ravi S. Sandhu,et al. Cryptographic Implementation of a Tree Hierarchy for Access Control , 1988, Inf. Process. Lett..
[10] Selim G. Akl,et al. Cryptographic solution to a problem of access control in a hierarchy , 1983, TOCS.
[11] Selim G. Akl,et al. Views for Multilevel Database Security , 1987, IEEE Transactions on Software Engineering.
[12] Donald Ervin Knuth,et al. The Art of Computer Programming , 1968 .
[13] P. Ribenboim. The Book of Prime Number Records , 1988 .
[14] Alfred Menezes,et al. Contemporary cryptology—The science of information integrity , 1994 .
[15] Chinchen Chang,et al. A cryptographic implementation for dynamic access control in a user hierarchy , 1995, Comput. Secur..
[16] Stafford E. Tavares,et al. Flexible Access Control with Master Keys , 1989, CRYPTO.
[17] L. J. Fraim. Scomp: A Solution to the Multilevel Security Problem , 1983, Computer.
[18] John McHugh,et al. A Security Policy And Formal Top Level Specification For A Multi-Level Secure Local Area Network , 1986, 1986 IEEE Symposium on Security and Privacy.
[19] Lein Harn,et al. A cryptographic key generation scheme for multilevel data security , 1990, Comput. Secur..
[20] Chu-Hsing Lin,et al. Dynamic key management schemes for access control in a hierarchy , 1997, Comput. Commun..
[21] James R. Nechvatal. Public-Key Cryptography , 1991 .
[22] Dorothy E. Denning,et al. Cryptography and Data Security , 1982 .
[23] Chin-Chen Chang,et al. Access control in a hierarchy using a one-way trap door function , 1993 .