Flexible Access Control with Master Keys
- 6 July 2001
- conference paper
- Published by Springer Nature
- p. 316-322
- https://doi.org/10.1007/0-387-34805-0_29
Abstract
No abstract availableKeywords
This publication has 13 references indexed in Scilit:
- The first ten years of public-key cryptographyProceedings of the IEEE, 1988
- Protocol failures in cryptosystemsProceedings of the IEEE, 1988
- Cryptographic implementation of a tree hierarchy for access controlInformation Processing Letters, 1988
- An Optimal Algorithm for Assigning Cryptographic Keys to Control Access in a HierarchyIEEE Transactions on Computers, 1985
- Cryptographic solution to a problem of access control in a hierarchyACM Transactions on Computer Systems, 1983
- New Key Generation Algorithms for Multilevel SecurityPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1983
- A conference key distribution systemIEEE Transactions on Information Theory, 1982
- More on master keys for group sharingInformation Processing Letters, 1981
- Master keys for group sharingInformation Processing Letters, 1981
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978