{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T12:46:32Z","timestamp":1772023592365,"version":"3.50.1"},"publisher-location":"New York, NY","reference-count":16,"publisher":"Springer New York","isbn-type":[{"value":"9780387973173","type":"print"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/0-387-34805-0_29","type":"book-chapter","created":{"date-parts":[[2007,11,9]],"date-time":"2007-11-09T02:05:53Z","timestamp":1194573953000},"page":"316-322","source":"Crossref","is-referenced-by-count":46,"title":["Flexible Access Control with Master Keys"],"prefix":"10.1007","author":[{"given":"Gerald C.","family":"Chick","sequence":"first","affiliation":[]},{"given":"Stafford E.","family":"Tavares","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"29_CR1","doi-asserted-by":"crossref","unstructured":"S. G. Akl and P. D. Taylor, Cryptographic solution to a multilevel security problem, in Advances in Cryptology-Proceedings of Crypto\u2019 82, Springer-Verlag, 1983, pp. 237\u2013249.","DOI":"10.1007\/978-1-4757-0602-4_23"},{"key":"29_CR2","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1145\/357369.357372","volume":"1","author":"S. G. Akl","year":"1983","unstructured":"\u2014, Cryptographic solution to a problem of access control in a hierarchy, ACM Trans. Comput. Syst., 1 (1983), pp. 239\u2013248.","journal-title":"ACM Trans. Comput. Syst."},{"key":"29_CR3","unstructured":"B. L. Chan and H. Meijer, A multiple trusted nodes security system, in 13th Biennial Symposium on Communications, Kingston, Canada, 1986, Queen\u2019s University."},{"key":"29_CR4","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1016\/0020-0190(81)90125-3","volume":"13","author":"D. E. Denning","year":"1981","unstructured":"D. E. Denning, H. Meijer, and F. B. Schneider, More on master keys for group sharing, Inf. Process. Lett., 13 (1981), pp. 125\u2013126.","journal-title":"Inf. Process. Lett."},{"key":"29_CR5","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/0020-0190(81)90070-3","volume":"12","author":"D. E. Denning","year":"1981","unstructured":"D. E. Denning and F. B. Schneider, Master keys for group sharing, Inf. Process. Lett., 12 (1981), pp. 23\u201325.","journal-title":"Inf. Process. Lett."},{"key":"29_CR6","doi-asserted-by":"publisher","first-page":"565","DOI":"10.1109\/5.4442","volume":"76","author":"W. Diffie","year":"1988","unstructured":"W. Diffie, The first ten years of public key cryptography, Proceedings of the IEEE, 76 (1988), p. 565.","journal-title":"Proceedings of the IEEE"},{"key":"29_CR7","doi-asserted-by":"publisher","first-page":"714","DOI":"10.1109\/TIT.1982.1056542","volume":"IT-28","author":"I. Ingemarsson","year":"1982","unstructured":"I. Ingemarsson, D. T. Tang, and C. K. Wong, A conference key distribution system, IEEE Trans. Information Theory, IT-28 (1982), pp. 714\u2013720.","journal-title":"IEEE Trans. Information Theory"},{"key":"29_CR8","first-page":"35","volume":"IT-29","author":"E. D. Kamin","year":"1983","unstructured":"E. D. Kamin, J. W. Greene, and M. E. Hellman, On secret sharing systems, IEEE Trans. Information Theory, IT-29 (1983), pp. 35\u201341.","journal-title":"IEEE Trans. Information Theory"},{"key":"29_CR9","doi-asserted-by":"crossref","unstructured":"S. J. MacKinnon and S. G. Akl, New key generation algorithms for multilevel security, in IEEE Symposium on Security and Privacy, 1983, pp. 72\u201378.","DOI":"10.1109\/SP.1983.10012"},{"key":"29_CR10","doi-asserted-by":"publisher","first-page":"797","DOI":"10.1109\/TC.1985.1676635","volume":"C-34","author":"S. J. MacKinnon","year":"1985","unstructured":"S. J. MacKinnon, P. D. Taylor, H. Meijer, and S. G. Akl, An optimal algorithm for assigning cryptographic keys to control access in a hierarchy, IEEE Trans. Comput., C-34 (1985), pp. 797\u2013802.","journal-title":"IEEE Trans. Comput."},{"key":"29_CR11","volume-title":"Cryptology: Complexity and Applications","author":"H. Meijer","year":"1983","unstructured":"H. Meijer, Cryptology: Complexity and Applications, PhD thesis, Department of Mathematics and Statistics, Queen\u2019s University, Kingston, Canada, 1983."},{"key":"29_CR12","doi-asserted-by":"publisher","first-page":"594","DOI":"10.1109\/5.4444","volume":"76","author":"J. H. Moore","year":"1988","unstructured":"J. H. Moore, Protocol failures in cryptosystems, Proceedings of the IEEE, 76 (1988), pp. 594\u2013602.","journal-title":"Proceedings of the IEEE"},{"key":"29_CR13","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. L. Rivest","year":"1978","unstructured":"R. L. Rivest, A. Shamir, and L. Adelman, A method for obtaining digital signatures and public-key cryptosystems, Comm. ACM, 21 (1978), pp. 120\u2013126.","journal-title":"Comm. ACM"},{"key":"29_CR14","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/0020-0190(88)90099-3","volume":"27","author":"R. S. Sandhu","year":"1988","unstructured":"R. S. Sandhu, Cryptographic implementation of a tree hierarchy for access control, Inf. Process. Lett., 27 (1988), pp. 95\u201398.","journal-title":"Inf. Process. Lett."},{"key":"29_CR15","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"A. Shamir, How to share a secret, Comm. ACM, 22 (1979), pp. 612\u2013613.","journal-title":"Comm. ACM"},{"key":"29_CR16","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1080\/0161-118391857900","volume":"7","author":"G. J. Simmons","year":"1983","unstructured":"G. J. Simmons, A \u2018weak\u2019 privacy protocol using the RSA cryptoalgorithm, Cryptologia, 7 (1983), pp. 180\u2013182.","journal-title":"Cryptologia"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO\u2019 89 Proceedings"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/0-387-34805-0_29.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T05:28:11Z","timestamp":1619501291000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/0-387-34805-0_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387973173"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/0-387-34805-0_29","relation":{},"subject":[]}}