1. A.V. Aho, M.R. Garey, J.D. Ullman, The transitive reduction of a directed graph. SIAM J. Comput. 1, 131–137 (1972)
2. S.G. Akl, P.D. Taylor, Cryptographic solution to a problem of access control in a hierarchy. ACM Trans. Comput. Syst. 1(3), 239–248 (1983)
3. M.J. Atallah, M. Blanton, N. Fazio, K.B. Frikken, Dynamic and efficient key management for access hierarchies. ACM Trans. Inf. Syst. Secur. 12(3) (2009). Preliminary version in Proc. of the ACM Conference on Computer and Communications Security 2006
4. M.J. Atallah, M. Blanton, K.B. Frikken, Key management for non-tree access hierarchies, in Proc. of the ACM Symposium on Access Control Models and Technologies (2006), pp. 11–18
5. M.J. Atallah, M. Blanton, K.B. Frikken, Incorporating temporal capabilities in existing key management schemes, in ESORICS (2007), pp. 515–530