Subject
Computational Theory and Mathematics,Logic,Theoretical Computer Science,Software
Reference16 articles.
1. Cryptographic solution to a problem of access control in a hierarchy;Akl;ACM Trans. Comput. Syst.,1983
2. Dynamic and efficient key management for access hierarchies;Atallah;ACM Trans. Inform. Syst. Security,2009
3. G. Ateniese, A. De Santis, A.L. Ferrara, B. Masucci, Provably-secure time-bound hierarchical key assignment schemes, in: Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006, pp. 288–297.
4. M. Backes, C. Cachin, A. Oprea, Secure key-updating for lazy revocation, in: Proceedings of 11th European Symposium on Research in Computer Security, 2006, pp. 327–346.
5. D.E. Bell, L. LaPadula, Secure Computer Systems: Mathematical foundations, Technical Report MTR-2547, vol. I, Mitre Corporation, Bedford, Massachusetts, 1973.
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Big Data and Privacy State of the Art;Research Anthology on Blockchain Technology in Business, Healthcare, Education, and Government;2021
2. Big Data and Privacy State of the Art;Advances in Computational Intelligence and Robotics;2019
3. Combination of Access Control and De-Identification for Privacy Preserving in Big Data;International Journal of Information Security and Privacy;2016-01
4. New Private Information Retrieval Protocol Using Social Bees Lifstyle over Cloud Computing;2015 IEEE International Conference on Computational Intelligence & Communication Technology;2015-02
5. A Multilayer Evolutionary Homomorphic Encryption Approach for Privacy Preserving over Big Data;2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery;2014-10