Login / Signup

Cryptographic enforcement of information flow policies without public information via tree partitions.

Jason CramptonNaomi FarleyGregory Z. GutinMark JonesBertram Poettering
Published in: J. Comput. Secur. (2017)
Keyphrases
  • information flow
  • information flows
  • flow analysis
  • social networks
  • real world
  • computer systems
  • knowledge discovery
  • information security
  • communication networks
  • multi context systems