Author:
Yeh Jyh-haw,Chow Randy,Newman Richard
Subject
Artificial Intelligence,Information Systems and Management,Computer Science Applications,Theoretical Computer Science,Control and Systems Engineering,Software
Reference17 articles.
1. Cryptographic solution to a problem of access control in a hierarchy;Akl;ACM Transactions on Computer Systems,1983
2. An optimal algorithm for assigning cryptographic keys to control access in a hierarchy;Mackinnon;IEEE Transactions on Computers,1985
3. Cryptographic implementation of a tree hierarchy for access control;Sandhu;Information Processing Letters,1988
4. A cryptographic key generation scheme for multilevel data security;Harn;Computers and Security,1990
5. L. Harn, Y.-R. Chien, T. Kiesler, An extended cryptographic key generation scheme for multilevel data security, in: Fifth Annual Computer Security Application Conference, 1989, pp. 254–262
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献