Controlling access in tree hierarchies (Q1328542): Difference between revisions
From MaRDI portal
Set profile property. |
ReferenceBot (talk | contribs) Changed an Item |
||
(3 intermediate revisions by 3 users not shown) | |||
Property / full work available at URL | |||
Property / full work available at URL: https://doi.org/10.1016/0020-0255(94)90020-5 / rank | |||
Normal rank | |||
Property / OpenAlex ID | |||
Property / OpenAlex ID: W2002213690 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: A dynamic cryptographic key assignment scheme in a tree structure / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: An improved algorithm for computing logarithms over<tex>GF(p)</tex>and its cryptographic significance (Corresp.) / rank | |||
Normal rank |
Latest revision as of 16:03, 22 May 2024
scientific article
Language | Label | Description | Also known as |
---|---|---|---|
English | Controlling access in tree hierarchies |
scientific article |
Statements
Controlling access in tree hierarchies (English)
0 references
5 February 1995
0 references
Sandhu's scheme
0 references
cryptographic key assignment scheme
0 references
tree hierarchies
0 references
access control
0 references