Cryptographic implementation of a tree hierarchy for access control
- 1 February 1988
- journal article
- Published by Elsevier in Information Processing Letters
- Vol. 27 (2) , 95-98
- https://doi.org/10.1016/0020-0190(88)90099-3
Abstract
No abstract availableKeywords
This publication has 6 references indexed in Scilit:
- An Optimal Algorithm for Assigning Cryptographic Keys to Control Access in a HierarchyIEEE Transactions on Computers, 1985
- Cryptographic solution to a problem of access control in a hierarchyACM Transactions on Computer Systems, 1983
- More on master keys for group sharingInformation Processing Letters, 1981
- A user authentication scheme for shared data based on a trap-door one-way functionInformation Processing Letters, 1981
- Master keys for group sharingInformation Processing Letters, 1981
- The Design of a Cryptography Based Secure File SystemIEEE Transactions on Software Engineering, 1980