Cryptographic Enforcement of Information Flow Policies Without Public Information
暂无分享,去创建一个
Gregory Gutin | Mark Jones | Jason Crampton | Bertram Poettering | Naomi Farley | Bertram Poettering | G. Gutin | Mark Jones | Naomi Farley | J. Crampton
[1] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[2] Gregory Gutin,et al. Digraphs - theory, algorithms and applications , 2002 .
[3] Jason Crampton,et al. Constructing Key Assignment Schemes from Chain Partitions , 2010, DBSec.
[4] Alfredo De Santis,et al. New constructions for provably-secure time-bound hierarchical key assignment schemes , 2008, Theor. Comput. Sci..
[5] Mikhail J. Atallah,et al. Incorporating Temporal Capabilities in Existing Key Management Schemes , 2007, ESORICS.
[6] A. Föhrenbach,et al. SIMPLE++ , 2000, OR Spectr..
[7] Ronald L. Rivest,et al. Introduction to Algorithms, third edition , 2009 .
[8] Gregory Gutin,et al. Minimum leaf out-branching and related problems , 2008, Theor. Comput. Sci..
[9] Xin-She Yang,et al. Introduction to Algorithms , 2021, Nature-Inspired Optimization Algorithms.
[10] D. Elliott Bell,et al. Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .
[11] Kenneth G. Paterson,et al. Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes , 2013, CT-RSA.
[12] Ravi S. Sandhu,et al. Cryptographic Implementation of a Tree Hierarchy for Access Control , 1988, Inf. Process. Lett..
[13] Alfredo De Santis,et al. New constructions for provably-secure time-bound hierarchical key assignment schemes , 2007, SACMAT '07.
[14] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[15] Jason Crampton,et al. Practical and efficient cryptographic enforcement of interval-based access control policies , 2011, TSEC.
[16] Marina Blanton,et al. Dynamic and Efficient Key Management for Access Hierarchies , 2009, TSEC.
[17] Jason Crampton,et al. On key assignment for hierarchical access control , 2006, 19th IEEE Computer Security Foundations Workshop (CSFW'06).