Cited By
View all- Alderman JCrampton JFarley NBertino ESandhu RWeippl E(2017)A Framework for the Cryptographic Enforcement of Information Flow PoliciesProceedings of the 22nd ACM on Symposium on Access Control Models and Technologies10.1145/3078861.3078868(143-154)Online publication date: 7-Jun-2017
- Liu BWarinschi B(2016)Universally Composable Cryptographic Role-Based Access ControlProceedings of the 10th International Conference on Provable Security - Volume 1000510.1007/978-3-319-47422-9_4(61-80)Online publication date: 10-Nov-2016
- Alderman JJanson CCid CCrampton JBao FMiller SZhou JAhn G(2015)Access Control in Publicly Verifiable Outsourced ComputationProceedings of the 10th ACM Symposium on Information, Computer and Communications Security10.1145/2714576.2714636(657-662)Online publication date: 14-Apr-2015
- Show More Cited By