共 22 条
[1]
CRYPTOGRAPHIC SOLUTION TO A PROBLEM OF ACCESS-CONTROL IN A HIERARCHY
[J].
ACM TRANSACTIONS ON COMPUTER SYSTEMS,
1983, 1 (03)
:239-248
[2]
[Anonymous], 1982, CRYPTOGRAPHY DATA SE, DOI DOI 10.5555/539308
[6]
CHANG CC, 1994, T INFORMATION PROCES, V35, P2189
[7]
A DATABASE ENCRYPTION SYSTEM WITH SUBKEYS
[J].
ACM TRANSACTIONS ON DATABASE SYSTEMS,
1981, 6 (02)
:312-328
[8]
Denning D. E., 1986, Proceedings of the 1986 IEEE Symposium on Security and Privacy (Cat. No.86CH2292-1), P156
[9]
FRAIM LJ, 1983, IEEE COMPUTER JUL, P126
[10]
Harn L., 1990, Computers & Security, V9, P539, DOI 10.1016/0167-4048(90)90132-D