Issue No.09 - September (1985 vol.34)
A cryptographic scheme for controlling access to information within a group of users organized in a hierarchy was proposed in . The scheme enables a user at some level to compute from his own cryptographic key the keys of the users below him in the organization.
partially ordered set, Access control, canonical assignment, cooperative attack, cryptographic key, hierarchy, key generation algorithm
P.D. Taylor, H. Meijer, S.G. Akl, "An Optimal Algorithm for Assigning Cryptographic Keys to Control Access in a Hierarchy", IEEE Transactions on Computers, vol.34, no. 9, pp. 797-802, September 1985, doi:10.1109/TC.1985.1676635