A new key assignment scheme for enforcing complicated access control policies in hierarchy
Future Generation Computer Systems - Selected papers from CCGRID 2002
Controlling access in large partially ordered hierarchies using cryptographic keys
Journal of Systems and Software
Cryptographic key assignment schemes for any access control policy
Information Processing Letters
Modifying YCN key assignment scheme to resist the attack from Hwang
Information Processing Letters
Unconditionally secure key assignment schemes
Discrete Applied Mathematics - Special issue: Coding and cryptography
Tolerant Key Assignment for Enforcing Complicated Access Control Policies in a Hierarchy
Fundamenta Informaticae
A secure time-bound hierarchical key assignment scheme based on RSA public key cryptosystem
Information Processing Letters
Efficient migration access control for mobile agents
Computer Standards & Interfaces
Enforcing non-hierarchical access policies by hierarchical key assignment schemes
Information Processing Letters
Unconditionally secure key assignment schemes
Discrete Applied Mathematics - Special issue: Coding and cryptography
Modifying YCN key assignment scheme to resist the attack from Hwang
Information Processing Letters
Cryptographic key assignment schemes for any access control policy
Information Processing Letters
An efficient key assignment scheme for access control in a large leaf class hierarchy
Information Sciences: an International Journal
Enforcement of non-hierarchical access policies
ICCOM'06 Proceedings of the 10th WSEAS international conference on Communications
Tolerant Key Assignment for Enforcing Complicated Access Control Policies in a Hierarchy
Fundamenta Informaticae
Hi-index | 0.89 |