共 72 条
[1]
CRYPTOGRAPHIC SOLUTION TO A PROBLEM OF ACCESS-CONTROL IN A HIERARCHY
[J].
ACM TRANSACTIONS ON COMPUTER SYSTEMS,
1983, 1 (03)
:239-248
[2]
ALON N, 1987, 7187 TR TEL AV U I C
[3]
Anderson R, 1996, PROCEEDINGS OF THE SECOND USENIX WORKSHOP ON ELECTRONIC COMMERCE, P1
[4]
Anderson R., 1998, Security Protocols. 5th International Workshop Proceedings, P125, DOI 10.1007/BFb0028165
[5]
[Anonymous], 1995, Combinatorics, Probability and Computing
[6]
[Anonymous], 1992, Combinatorics and Partially Ordered Sets: Dimension Theory
[7]
[Anonymous], 1992, 15 NAT COMP SEC C
[8]
[Anonymous], NORDIC J COMPUTING
[9]
Atallah M.J., 2005, P ACM C COMPUTER COM, P190
[10]
BELL DE, 1973, MTR2547 MITRE CORP