1985 | ||
---|---|---|
2 | Stephen J. MacKinnon, Peter D. Taylor, Henk Meijer, Selim G. Akl: An Optimal Algorithm for Assigning Cryptographic Keys to Control Access in a Hierarchy. IEEE Trans. Computers 34(9): 797-802 (1985) | |
1983 | ||
1 | Stephen J. MacKinnon, Selim G. Akl: New Key Generation Algorithms for Multilevel Security. IEEE Symposium on Security and Privacy 1983: 72-78 |
1 | Selim G. Akl | [1] [2] |
2 | Henk Meijer | [2] |
3 | Peter D. Taylor | [2] |