Article ID Journal Published Year Pages File Type
428682 Information Processing Letters 2009 4 Pages PDF
Abstract

Without proposing a new key assignment scheme, this paper presents a graph translation procedure so that more complicated non-hierarchical access control policies can be enforced by existing hierarchical key assignment schemes.

Related Topics
Physical Sciences and Engineering Computer Science Computational Theory and Mathematics