1. A. Silberschatz, P.B. Galvin, & G. Gagne,Operating system concepts, Sixth Edition (Hoboken, NJ: John Wiley & Sons, Inc., 2001).
2. T.S. Chen, Y.F. Chung, & C.S. Tian, A novel key management scheme for dynamic access control in a user hierarchy, inProceedings of the 28th Annual International Computer Software and Applications Conference (COMPSAC), Hong Kong, China, 2004, 396–401.
3. G.C. Chick & S.E. Tavares, Flexible access control with master keys,Proceedings on Advances in Cryptology: CRYPTO ’89, LNCS, Santa Barbara, CA, USA, 1989, 316–322.
4. I. Ray, I. Ray, & N. Narasimhamurthi, A cryptographic solution to implement access control in a hierarchy and more,SACMAT ’02: Proceedings of the seventh ACM symposium on Access control models and technologies, Monterey, CA, USA, 2002, 65–73.
5. D.R. Stinson,Cryptography: Theory and practice, Third Edition (Boca Raton, USA: CRC Press, 2005).