• search
    search
  • reviewers
    reviewers
  • feeds
    feeds
  • assignments
    assignments
  • settings
  • logout

Cryptographic enforcement of information flow policies without public information via tree partitions.

Jason CramptonNaomi FarleyGregory Z. GutinMark JonesBertram Poettering
Published in: J. Comput. Secur. (2017)
Keyphrases
  • information flow
  • information flows
  • flow analysis
  • social networks
  • real world
  • computer systems
  • knowledge discovery
  • information security
  • communication networks
  • multi context systems