The following publications are possibly variants of this publication:
- Tolerant Key Assignment for Enforcing Complicated Access Control Policies in a HierarchyYa-Fen Chang, Chin-Chen Chang. FUIN, 76(1-2):13-23, 2007. [doi]
- A new cryptographic key assignment scheme with time-constraint access control in a hierarchyHui-Feng Huang, Chin-Chen Chang. csi, 26(3):159-166, 2004. [doi]
- Crypographic key assignment scheme for access control in a hierarchyChin-Chen Chang, Ren-Junn Hwang, Tzong-Chen Wu. is, 17(3):243-247, 1992.
- Cryptographic key assignment scheme for hierarchical access controlTzong-Chen Wu, Chin-Chen Chang. csse, 16(1):25-28, 2001.
- An efficient key assignment scheme for access control in a large leaf class hierarchyJung-Wen Lo, Min-Shiang Hwang, Chia-Hsin Liu. isci, 181(4):917-925, 2011. [doi]
- A Key Assignment Scheme for Controlling Access in Partially Ordered User HierarchiesChin-Chen Chang, Iuon-Chang Lin, Hui-Min Tsai, Hsiao-Hsi Wang. aina 2004: 376-379 [doi]