Login / Signup
Cryptographic enforcement of information flow policies without public information via tree partitions.
Jason Crampton
Naomi Farley
Gregory Z. Gutin
Mark Jones
Bertram Poettering
Published in:
J. Comput. Secur. (2017)
Keyphrases
</>
information flow
information flows
flow analysis
social networks
real world
computer systems
knowledge discovery
information security
communication networks
multi context systems