Cryptographic enforcement of information flow policies without public information via tree partitions. / Crampton, Jason; Farley, Naomi; Gutin, Gregory; Jones, Mark; Poettering, Bertram.
In: Journal of Computer Security, Vol. 25, No. 6, 24.08.2017, p. 511-535.Research output: Contribution to journal › Article › peer-review
Accepted author manuscript, 258 KB, PDF document
Submitted manuscript
Original language | English |
---|---|
Pages (from-to) | 511-535 |
Number of pages | 25 |
Journal | Journal of Computer Security |
Volume | 25 |
Issue number | 6 |
DOIs | |
Publication status | Published - 24 Aug 2017 |
ID: 27876544