Tree-based cryptographic access control J Alderman, N Farley, J Crampton Computer Security–ESORICS 2017: 22nd European Symposium on Research in …, 2017 | 12 | 2017 |
Cryptographic enforcement of information flow policies without public information J Crampton, N Farley, G Gutin, M Jones, B Poettering Applied Cryptography and Network Security: 13th International Conference …, 2015 | 12 | 2015 |
Cryptographic enforcement of information flow policies without public information via tree partitions 1 J Crampton, N Farley, G Gutin, M Jones, B Poettering Journal of Computer Security 25 (6), 511-535, 2017 | 6 | 2017 |
A framework for the cryptographic enforcement of information flow policies J Alderman, J Crampton, N Farley Proceedings of the 22nd ACM on Symposium on Access Control Models and …, 2017 | 5 | 2017 |
Optimal constructions for chain-based cryptographic enforcement of information flow policies J Crampton, N Farley, G Gutin, M Jones Data and Applications Security and Privacy XXIX: 29th Annual IFIP WG 11.3 …, 2015 | 4 | 2015 |
On Key Assignment Schemes and Cryptographic Enforcement Mechanisms for Information Flow Policies N Farley Royal Holloway, University of London, 2018 | | 2018 |