A cryptographic implementation for dynamic access control in a user hierarchy.
Hui-Min TsaiChin-Chen ChangPublished in: Comput. Secur. (1995)
Keyphrases
- user interface
- user defined
- user queries
- user preferences
- user feedback
- user interaction
- dynamic access control
- data sets
- cost benefit analysis
- hierarchical structure
- higher level
- end users
- search engine
- user profiles
- user experience
- smart card
- low level
- user interests
- information overload
- user requirements
- user centered
- neural network