Subject
Computational Mathematics,Computational Theory and Mathematics,Modeling and Simulation
Reference7 articles.
1. Cryptographic implementation of a tree hierarchy for access control;Sandhu;Information Processing Letters,1988
2. Cryptographic solution to a multilevel security problem;Akl;Proc. Crypto—82,1982
3. Cryptographic solution to a problem of access control in a hierarchy;Akl;ACM Transactions on Computer Systems,1983
4. An optimal algorithm for assigning cryptographic keys to control access in hierarchy;MacKinnon;IEEE Transactions on Computers,1985
Cited by
21 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献