1985 | ||
---|---|---|
3 | Stephen J. MacKinnon, Peter D. Taylor, Henk Meijer, Selim G. Akl: An Optimal Algorithm for Assigning Cryptographic Keys to Control Access in a Hierarchy. IEEE Trans. Computers 34(9): 797-802 (1985) | |
1983 | ||
2 | EE | Selim G. Akl, Peter D. Taylor: Cryptographic Solution to a Problem of Access Control in a Hierarchy ACM Trans. Comput. Syst. 1(3): 239-248 (1983) |
1982 | ||
1 | Selim G. Akl, Peter D. Taylor: Cryptographic Solution to a Multilevel Security Problem. CRYPTO 1982: 237-249 |
1 | Selim G. Akl | [1] [2] [3] |
2 | Stephen J. MacKinnon | [3] |
3 | Henk Meijer | [3] |