共 27 条
[1]
CRYPTOGRAPHIC SOLUTION TO A PROBLEM OF ACCESS-CONTROL IN A HIERARCHY
[J].
ACM TRANSACTIONS ON COMPUTER SYSTEMS,
1983, 1 (03)
:239-248
[2]
[Anonymous], 1982, CRYPTOGRAPHY DATA SE, DOI DOI 10.5555/539308
[3]
CHANDRASEKARAN R, 1992, IFDC SP PUB, V17, P3
[6]
CHANG CC, 1994, T INFORMATION PROCES, V35, P2189
[7]
A DATABASE ENCRYPTION SYSTEM WITH SUBKEYS
[J].
ACM TRANSACTIONS ON DATABASE SYSTEMS,
1981, 6 (02)
:312-328
[8]
Denning D. E., 1984, Proceedings of the 1984 Symposium on Security and Privacy, P52
[9]
Denning D. E., 1986, Proceedings of the 1986 IEEE Symposium on Security and Privacy (Cat. No.86CH2292-1), P156
[10]
FRAIM LJ, 1983, IEEE COMPUTER JUL, P26