Tianwen Lin

  • Citations Per Year
Learn More
Consider an information system in which users are organized in a hierarchical structure for access control. In such a system, there are a number of disjoint security classes and each user belongs to one of the security classes. Each security class is assigned a key, used for encryption, identification, etc. Among the security classes, there is a partial(More)
  • 1