Optimal Constructions for Chain-based Cryptographic Enforcement of Information Flow Policies.
Jason CramptonNaomi FarleyGregory Z. GutinMark JonesPublished in: CoRR (2015)
Keyphrases
- information flow
- information flows
- flow analysis
- access control policies
- social networks
- information security
- flow graph
- optimal solution
- supply chain
- communication networks
- multi threaded
- dynamic programming
- optimal policy
- smart card
- multi context systems
- databases
- distributed databases
- access control
- data management
- information technology