Sciweavers

COMPSEC
2002
92views more  COMPSEC 2002»
13 years 4 months ago
A practical key management scheme for access control in a user hierarchy
In a user hierarchy we say that a security class is subordinate to another security class if the former has a lower security privilege than the latter. To implement such a hierarc...
Sheng Zhong