1. Wu, Z., Chung, Y., Lai, F., Chen, T., A Password-Based User Authentication Scheme for the Integrated EPR Information System. J Med Syst, 2010. doi: 10.1007/s10916-010-9527-7 .
2. Nikooghadam, M., Zakerolhosseini, A., Moghaddam, M.E., Efficient Utilization of Elliptic Curve Cryptosystem for Hierarchical Access Control. The Journal of Systems and Software, 2010. doi: 10.1016/j.jss.2010.05.072 .
3. Akl, S.G., Taylor, P.D., Cryptographic solution to a problem of access control in a hierarchy. ACM Transaction on Computer Systems 1(3):239–248, 1983.
4. Mackinnon, S.T. ,Taylor, P.D., An optimal algorithm for assigning cryptographic keys to control access in a hierarchy. IEEE Transaction on Computer systems 34 (9):797–802, 1985.
5. Harn, L., Lin, H.Y., A cryptographic key generation scheme for multilevel data security. Computer Security 9:539–546, 1990.