Publisher
Springer Science and Business Media LLC
Subject
Geometry and Topology,Theoretical Computer Science,Software
Reference25 articles.
1. Akl SG, Taylor PD (1983) Cryptographic solution to a problem of access control in a hierarchy. ACM Trans Comput Syst 1(3):239–248
2. Balamurugan B, Krishna PV (2015) Enhanced role-based access control for cloud security, artificial intelligence and evolutionary algorithms in engineering systems. Adv Intell Syst Comput 324:837–852
3. Cao J, Yao ZA (2005) An improved access control scheme for hierarchical groups. In: Proceedings of the 19th international conference on advanced information networking and applications, pp 719–723
4. Chang CC, Lin C-H, Lee W, Hwang P-C (2004) Secret sharing with access structures in a hierarchy. In: Proceedings of the 18th international conference on advanced information networking and application, pp 123–126
5. Chen HC, Christiana A (2014) A role-based RSA key management approach in a hierarchy scheme. In: Proceedings of eighth international conference on innovative mobile and internet services in ubiquitous computing (IMIS2014), pp 258–264, Birmingham, UK, 2–4 July 2014
Cited by
16 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献