CRYPTOGRAPHIC IMPLEMENTATION OF A TREE HIERARCHY FOR ACCESS-CONTROL

被引:134
|
作者
SANDHU, RS
机构
[1] Ohio State Univ, Columbus, OH, USA, Ohio State Univ, Columbus, OH, USA
关键词
D O I
10.1016/0020-0190(88)90099-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
9
引用
收藏
页码:95 / 98
页数:4
相关论文
共 50 条
  • [41] ACCESS-CONTROL FOR COMPUTER-SYSTEMS
    FARQUHAR, W
    INFORMATION AGE, 1985, 7 (01): : 25 - 29
  • [42] ACCESS-CONTROL METHODS OF VAX/VMS
    REISINGER, DA
    INFORMATION AGE, 1988, 10 (03): : 162 - 168
  • [43] A CALCULUS FOR ACCESS-CONTROL IN DISTRIBUTED SYSTEMS
    ABADI, M
    BURROWS, M
    LAMPSON, B
    PLOTKIN, G
    ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 1993, 15 (04): : 706 - 734
  • [44] SMART CARD AND ACCESS-CONTROL SYSTEMS
    LEMARCHANT, P
    ACTA ELECTRONICA, 1983, 25 (01): : 93 - 98
  • [45] INTEGRATION OF USER AUTHENTICATION AND ACCESS-CONTROL
    HARN, L
    LIN, HY
    IEE PROCEEDINGS-E COMPUTERS AND DIGITAL TECHNIQUES, 1992, 139 (02): : 139 - 143
  • [46] CLASSIFICATION OF OBJECTS FOR IMPROVED ACCESS-CONTROL
    BOOYSEN, HAS
    ELOFF, JHP
    COMPUTERS & SECURITY, 1995, 14 (03) : 251 - 265
  • [47] ACCESS-CONTROL LISTS IN CAPABILITY ENVIRONMENTS
    LOPRIORE, L
    TSI-TECHNIQUE ET SCIENCE INFORMATIQUES, 1984, 3 (03): : 179 - 191
  • [48] A CALCULUS FOR ACCESS-CONTROL IN DISTRIBUTED SYSTEMS
    ABADI, M
    BURROWS, M
    LAMPSON, B
    PLOTKIN, G
    LECTURE NOTES IN COMPUTER SCIENCE, 1992, 576 : 1 - 23
  • [49] ACCESS-CONTROL FOR PRIVATE DECLARATIONS IN ADA
    SHEN, J
    CORMACK, GV
    COMPUTER LANGUAGES, 1994, 20 (02): : 117 - 126
  • [50] A DEFINITION OF AN ACCESS-CONTROL SYSTEMS LANGUAGE
    EMMS, J
    COMPUTER STANDARDS & INTERFACES, 1987, 6 (04) : 443 - 454