共 61 条
[1]
Aho A. V., 1972, SIAM Journal on Computing, V1, P131, DOI 10.1137/0201008
[2]
CRYPTOGRAPHIC SOLUTION TO A PROBLEM OF ACCESS-CONTROL IN A HIERARCHY
[J].
ACM TRANSACTIONS ON COMPUTER SYSTEMS,
1983, 1 (03)
:239-248
[3]
[Anonymous], 1979, TECHNICAL REPORT
[4]
[Anonymous], 2013, P INT C APPL CRYPT N
[5]
Atallah M. J., 2006, SACMAT 2006. Proceedings of Eleventh ACM Symposium on Access Control Models and Technologies, P11
[6]
Atallah M.J., 2005, P ACM C COMPUTER COM, P190
[7]
Atallah MJ, 2007, LECT NOTES COMPUT SC, V4734, P515
[9]
Ateniese G., 2012, J CRYPTOL, V25, P1
[10]
Ateniese G., 2006, P 13 ACM C COMPUTER, P288