Tzeng, “A Time-Bound Cryptographic Key Assignment Scheme for Access Control in a Hierarchy”, Knowledge and Data Engineering, IEEE Transactions on, vol. 14, Issue 1, Jan.-Feb. 2002, pp. 182-188.* |
Sloman et al., “Security and management policy separation”, IEEE Network, vol. 16, Issue 2, Mar.-Apr. 2002, pp. 10-19.* |
Wen et al., “A formal-compliant configurable encryption framework for access control of video”, Circuits and Systems for Video Technology, IEEE Transaction on, vol. 12, Issue 6, Jun. 2002, pp. 545-557.* |
Andrew S. Tanenbaum et al. “Experiences with the Amoeba Distributed Operating System” Dec. 1, 1990 pp. 46-63. |
Li Gong “A Secure Identity-Based Capability System” May 1, 1989 pp. 56-63. |
Paul A. Karger “New Methods for Immediate Revocation” May 1, 1989 pp. 48-55. |
Robert Van Renesse et al. “The Performance of the Amoeba Distibuted Operating System” Mar. 1, 1989 pp. 223-234. |
J. J. Hwang “A New Access Control Method Using Prime Factorisation” Feb. 1, 1992 pp. 16-20. |