17
Views
0
CrossRef citations to date
0
Altmetric
Original Articles

An algebra to represent security policies for cryptography-based secure storage systems

&
Pages 9-23 | Received 01 Mar 1986, Published online: 19 Mar 2007

References

  • Denning and Dorothy , E. 1982 . “ Purdue University ” . In Cryptography and Data Security , Addison-Wesley Pub. Co .
  • Meade G. George Fort Trusted Computer System Evaluation Criteria Maryland 1983 20755
  • Gifford and David , K. 1982 . Cryptographic sealing for information secrecy and authentication . Comm. ACM , 25 ( 4 ) : 274 – 286 .
  • Gudes and Ehud . 1980 . The design of a cryptography based secure file system . IEEE Trans, on Software Engineering , SE6 ( 5 )
  • Kronsjo and Lydia , I. 1979 . Algorithms: Their Complexity and Efficiency , John Wiley and Sons .
  • Mignotte , M. 1982 . Proceedings of the Workshop on Cryptography . How to share a secret . 1982 , Germany. Lecture Notes in Computer Science149, Cryptography
  • 1962 . Lisp 1.5 Programmer's Manual , Cambridge, MA : MIT Press .
  • Mignotte M. Data Encryption Standard, National Bureau of Standards, Federal Information Processing Standards 1977 46
  • Rivest , Ronald , L. , Shamir , Adi and Adleman , L. 1978 . A method for obtaining digital signatures and public key cryptosystems . Comm. ACM , 21 ( 2 ) : 120 – 126 .
  • Saltzer , J. H. 1974 . Protection and the control of information sharing in Multics . Comm. ACM , 17 ( 7 ) : 388 – 402 .
  • Shamir and Adi . 1979 . How to share a secret . Comm. ACM , 22 ( 11 ) : 612 – 613 .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.