Login / Signup
Delegation Chains Secure up to Constant Length.
Masayuki Abe
Tatsuaki Okamoto
Published in:
ICICS (1999)
Keyphrases
</>
access control
security issues
alphabet size
security policies
maximum number
security requirements
data security
lightweight
finite alphabet
trust relationships
authentication scheme
role based access control
security analysis
security measures
key agreement protocol
security mechanisms
cross domain