Network Flows: Theory, Algorithms, and Applications, 1993. ,
DOI : 10.21236/ADA594171
Cryptographic solution to a problem of access control in a hierarchy, ACM Transactions on Computer Systems, vol.1, issue.3, pp.239-248, 1983. ,
DOI : 10.1145/357369.357372
Dynamic and efficient key management for access hierarchies, ACM Trans. Inf. Syst. Secur, vol.12, issue.3, 2009. ,
DOI : 10.1145/1102120.1102147
URL : http://www.cse.nd.edu/~mblanton/papers/tissec09.pdf
Incorporating Temporal Capabilities in Existing Key Management Schemes, ESORICS. Lecture Notes in Computer Science, vol.4734, pp.515-530, 2007. ,
DOI : 10.1007/978-3-540-74835-9_34
URL : http://www.cerias.purdue.edu/bookshelf/archive/2007-99.pdf
Digraphs: Theory, Algorithms and Applications, 2009. ,
Ciphertext-Policy Attribute-Based Encryption, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.20-23, 2007. ,
DOI : 10.1109/SP.2007.11
URL : http://www.cs.berkeley.edu/~bethenco/oakland07cpabe.ps
Combining fragmentation and encryption to protect privacy in data storage, ACM Transactions on Information and System Security, vol.13, issue.3, 2010. ,
DOI : 10.1145/1805974.1805978
Practical and efficient cryptographic enforcement of interval-based access control policies, ACM Transactions on Information and System Security, vol.14, issue.1, p.14, 2011. ,
DOI : 10.1145/1952982.1952996
Constructing Key Assignment Schemes from Chain Partitions, Lecture Notes in Computer Science, vol.6166, pp.130-145, 2010. ,
DOI : 10.1007/978-3-642-13739-6_9
URL : https://hal.archives-ouvertes.fr/hal-01056664
Cryptographic Enforcement of Information Flow Policies Without Public Information, Proceedings of ACNS 2015, 1410. ,
DOI : 10.1007/978-3-319-28166-7_19
On Key Assignment for Hierarchical Access Control, 19th IEEE Computer Security Foundations Workshop (CSFW'06), pp.98-111, 2006. ,
DOI : 10.1109/CSFW.2006.20
URL : http://www.isg.rhul.ac.uk/~jason/Pubs/csfw06.pdf
Security and tradeoffs of the Akl-Taylor scheme and its variants, MFCS. Lecture Notes in Computer Science, vol.5734, pp.247-257, 2009. ,
A Decomposition Theorem for Partially Ordered Sets, The Annals of Mathematics, vol.51, issue.1, pp.161-166, 1950. ,
DOI : 10.2307/1969503
Provably secure key assignment schemes from factoring Information Security and Privacy -16th Australasian Conference, ACISP 2011 Proceedings. Lecture Notes in Computer Science, vol.6812, pp.292-309, 2011. ,
DOI : 10.1007/978-3-642-22497-3_19
URL : http://www.isg.rhul.ac.uk/esvfreire/publications/ACISP2011.pdf
Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes, Proceedings. Lecture Notes in Computer Science, vol.7779, pp.101-114, 2013. ,
DOI : 10.1007/978-3-642-36095-4_7
URL : http://eprint.iacr.org/2012/645.pdf
Verallgemeinerung eines Graphentheoretischen Satzes von Rédei, Acta Sci. Math, vol.21, pp.181-186, 1960. ,
Attribute-based encryption with nonmonotonic access structures, Proceedings of the 2007 ACM Conference on Computer and Communications Security, pp.195-203, 2007. ,