1. S. G. Akl and P. D. Taylor, Cryptographic Solution to a Problem of Access Control in a Hierarchy, ACM Trans. on Computer Systems, 1(3), 239--248, 1983.
2. M. J. Atallah, M. Blanton, N. Fazio, and K. B. Frikken, Dynamic and Efficient Key Management for Access Hierarchies, CERIAS Tech. Rep. TR 2006-09, Purdue University. Prelim. version in Proc. of the 2005 ACM Conf. on Comput. and Commun. Security, 190--201, 2005.
3. M. J. Atallah, M. Blanton, and K. B. Frikken, Key Management for Non-Tree Access Hierarchies, in Proc. of the 2006 ACM Symp. on Access Control Models and Technologies, 11--18, 2006.
4. G. Ateniese, A. De Santis, A. L. Ferrara, and B. Masucci, Provably-Secure Time-Bound Hierarchical Key Assignment Schemes, IACR ePrint Archive, Report 2006/225.
5. M. Bellare, A. Desai, E. Jokipii, and P. Rogaway, A Concrete Security Treatment of Symmetric Encryption, in Proc. of the 38th IEEE Symp. on Found. of Computer Sci., 394--403, 1997.