Controlling access in tree hierarchies (Q1328542): Difference between revisions
From MaRDI portal
Created a new Item |
ReferenceBot (talk | contribs) Changed an Item |
||
(7 intermediate revisions by 6 users not shown) | |||
Property / author | |||
Property / author: Chin-Chen Chang / rank | |||
Property / author | |||
Property / author: Chin-Chen Chang / rank | |||
Normal rank | |||
Property / MaRDI profile type | |||
Property / MaRDI profile type: MaRDI publication profile / rank | |||
Normal rank | |||
Property / full work available at URL | |||
Property / full work available at URL: https://doi.org/10.1016/0020-0255(94)90020-5 / rank | |||
Normal rank | |||
Property / OpenAlex ID | |||
Property / OpenAlex ID: W2002213690 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: A dynamic cryptographic key assignment scheme in a tree structure / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: An improved algorithm for computing logarithms over<tex>GF(p)</tex>and its cryptographic significance (Corresp.) / rank | |||
Normal rank | |||
links / mardi / name | links / mardi / name | ||
Latest revision as of 17:03, 22 May 2024
scientific article
Language | Label | Description | Also known as |
---|---|---|---|
English | Controlling access in tree hierarchies |
scientific article |
Statements
Controlling access in tree hierarchies (English)
0 references
5 February 1995
0 references
Sandhu's scheme
0 references
cryptographic key assignment scheme
0 references
tree hierarchies
0 references
access control
0 references