Login / Signup
Optimal Constructions for Chain-Based Cryptographic Enforcement of Information Flow Policies.
Jason Crampton
Naomi Farley
Gregory Z. Gutin
Mark Jones
Published in:
DBSec (2015)
Keyphrases
</>
information flow
flow analysis
social networks
information flows
communication networks
access control policies
flow graph
functional modules
multi threaded
optimal solution
supply chain
information security
control policies
real world
optimal policy
smart card
case study
privacy policies
control policy