Sciweavers

COMPSEC
2002
92views more  COMPSEC 2002»
14 years 9 days ago
A practical key management scheme for access control in a user hierarchy
In a user hierarchy we say that a security class is subordinate to another security class if the former has a lower security privilege than the latter. To implement such a hierarc...
Sheng Zhong