Journal: ACM Trans. Inf. Syst. Secur.

Volume 3, Issue 2

63 -- 84Shlomi Dolev, Rafail Ostrovsky. Xor-trees for efficient anonymous multicast and reception
85 -- 106Sylvia L. Osborn, Ravi S. Sandhu, Qamar Munawer. Configuring role-based access control to enforce mandatory and discretionary access control policies
107 -- 134Avishai Wool. Key management for encrypted broadcast