1. Akl, S.G., Taylor, P.D.: Cryptographic Solution to a Problem of Access Control in a Hierarchy. ACM Trans. Comput. Syst. 1(3), 239–248 (1983)
2. Chang, C.C., Hwang, R.J., Wu, T.C.: Cryptographic Key Assignment Scheme for Access Control in a Hierarchy. Information Systems 17(3), 243–247 (1992)
3. Cover, T.M., Thomas, J.A.: Elements of Information Theory. John Wiley & Sons, Chichester (1991)
4. De Santis, A., Ferrara, A.L., Masucci, B.: Cryptographic Key Assignment Schemes for Any Access Control Policy (submitted for publication)
5. De Santis, A., Ferrara, A.L., Masucci, B.: Unconditionally Secure Hierarchical Key Assignment Schemes. In: Proc. of the International Workshop on Coding and Cryptography - WCC 2003, Versailles, France, March 24–28 (2003)