Cryptographic solution to a problem of access control in a hierarchy
- 1 August 1983
- journal article
- Published by Association for Computing Machinery (ACM) in ACM Transactions on Computer Systems
- Vol. 1 (3) , 239-248
- https://doi.org/10.1145/357369.357372
Abstract
No abstract availableThis publication has 6 references indexed in Scilit:
- Password authentication with insecure communicationCommunications of the ACM, 1981
- The Design of a Cryptography Based Secure File SystemIEEE Transactions on Software Engineering, 1980
- Symmetric and Asymmetric EncryptionACM Computing Surveys, 1979
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978
- An improved algorithm for computing logarithms overGF(p)and its cryptographic significance (Corresp.)IEEE Transactions on Information Theory, 1978
- A lattice model of secure information flowCommunications of the ACM, 1976