CRYPTOGRAPHIC IMPLEMENTATION OF A TREE HIERARCHY FOR ACCESS-CONTROL

被引:134
|
作者
SANDHU, RS
机构
[1] Ohio State Univ, Columbus, OH, USA, Ohio State Univ, Columbus, OH, USA
关键词
D O I
10.1016/0020-0190(88)90099-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
9
引用
收藏
页码:95 / 98
页数:4
相关论文
共 50 条
  • [31] FORMAL SPECIFICATION OF AN ACCESS-CONTROL SYSTEM
    STEPNEY, S
    LORD, SP
    SOFTWARE-PRACTICE & EXPERIENCE, 1987, 17 (09): : 575 - 593
  • [32] FLEXIBLE ACCESS-CONTROL WITH MASTER KEYS
    CHICK, GC
    TAVARES, SE
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 435 : 316 - 322
  • [33] A MEDIUM ACCESS-CONTROL PROTOCOL FOR AN ATM ACCESS NETWORK
    CASALS, O
    GARCIA, J
    BLONDIA, C
    HIGH SPEED NETWORKS AND THEIR PERFORMANCE, 1994, 21 : 289 - 308
  • [34] Distributed proving in access-control systems
    Bauer, L
    Gartiss, S
    Reiter, MK
    2005 IEEE Symposium on Security and Privacy, Proceedings, 2005, : 81 - 95
  • [35] Cryptographic Enforcement of Access Control Policies in the Cloud: Implementation and Experimental Assessment
    Berlato, Stefano
    Carbone, Roberto
    Ranise, Silvio
    SECRYPT 2021: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2021, : 370 - 381
  • [36] DYNAMIC ACCESS-CONTROL FOR RELATIONAL VIEWS
    ROUSSOPOULOS, N
    BADER, C
    INFORMATION SYSTEMS, 1985, 10 (03) : 361 - 369
  • [37] THE SOURCE OF AUTHORITY FOR COMMERCIAL ACCESS-CONTROL
    MOFFETT, JD
    SLOMAN, MS
    COMPUTER, 1988, 21 (02) : 59 - 69
  • [38] A new cryptographic key assignment scheme with lime-constraint access control in a hierarchy
    Huang, HF
    Chang, CC
    COMPUTER STANDARDS & INTERFACES, 2004, 26 (03) : 159 - 166
  • [39] A Decade of OS Access-Control Extensibility
    Watson, Robert N. M.
    COMMUNICATIONS OF THE ACM, 2013, 56 (02) : 52 - 63
  • [40] Access-control language for multidomain environments
    Joshi, JBD
    Bhatti, R
    Bertino, E
    Ghafoor, A
    IEEE INTERNET COMPUTING, 2004, 8 (06) : 40 - 50