Demirer, Rüştü MuratChiang, Chia-ChuBayrak, CoşkunŞeker, RemziTopaloğlu, ÜmitSamadi, NasrolaTek, SüleymanJiang, BianZhou, GuangXuWang, Xiaoran2018-07-302018-07-302009978-1-4244-2793-21062-922Xhttps://doi.org/10.1109/ICSMC.2009.5346329https://hdl.handle.net/11413/2412en-USAccess ControlCryptographic KeysCryptographyDynamic Key ManagementHierarchical Access ControlLatticeRekeyingKey Assignment SchemeManagement SchemesUser HierarchyCryptographyAlgorithmDesign of a lattice-based access control schemeArticle2-s2.0-74849107916