CRYPTOGRAPHIC IMPLEMENTATION OF A TREE HIERARCHY FOR ACCESS-CONTROL

被引:134
作者
SANDHU, RS
机构
[1] Ohio State Univ, Columbus, OH, USA, Ohio State Univ, Columbus, OH, USA
关键词
D O I
10.1016/0020-0190(88)90099-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
9
引用
收藏
页码:95 / 98
页数:4
相关论文
共 9 条
[1]   CRYPTOGRAPHIC SOLUTION TO A PROBLEM OF ACCESS-CONTROL IN A HIERARCHY [J].
AKL, SG ;
TAYLOR, PD .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 1983, 1 (03) :239-248
[2]  
[Anonymous], 1977, FIPS PUBLICATION, V46
[3]   MORE ON MASTER KEYS FOR GROUP SHARING [J].
DENNING, DE ;
MEIJER, H ;
SCHNEIDER, FB .
INFORMATION PROCESSING LETTERS, 1981, 13 (03) :125-126
[4]   MASTER KEYS FOR GROUP SHARING [J].
DENNING, DE ;
SCHNEIDER, FB .
INFORMATION PROCESSING LETTERS, 1981, 12 (01) :23-25
[5]   THE DESIGN OF A CRYPTOGRAPHY BASED SECURE FILE SYSTEM [J].
GUDES, E .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1980, 6 (05) :411-420
[6]   A USER AUTHENTICATION SCHEME FOR SHARED DATA BASED ON A TRAP-DOOR ONE-WAY FUNCTION [J].
INGEMARSSON, I ;
WONG, CK .
INFORMATION PROCESSING LETTERS, 1981, 12 (02) :63-67
[7]  
MACKINNON SJ, 1985, IEEE T COMPUT, V34, P797, DOI 10.1109/TC.1985.1676635
[8]  
MACKINNON ST, 1983, P 1983 IEEE S SEC PR, P72
[9]  
WILKES MV, 1972, TIME SHARING COMPUTE