Practical Constructions for the Efficient Cryptographic Enforcement of Interval-Based Access Control Policies