Cryptographic enforcement of information flow policies without public information via tree partitions
- Submitting institution
-
Royal Holloway and Bedford New College
- Unit of assessment
- 11 - Computer Science and Informatics
- Output identifier
- 28975212
- Type
- D - Journal article
- DOI
-
10.3233/JCS-16863
- Title of journal
- Journal of Computer Security
- Article number
- -
- First page
- 511
- Volume
- 25
- Issue
- 6
- ISSN
- 0926-227X
- Open access status
- Compliant
- Month of publication
- August
- Year of publication
- 2017
- URL
-
-
- Supplementary information
-
-
- Request cross-referral to
- -
- Output has been delayed by COVID-19
- No
- COVID-19 affected output statement
- -
- Forensic science
- No
- Criminology
- No
- Interdisciplinary
- No
- Number of additional authors
-
4
- Research group(s)
-
-
- Citation count
- 4
- Proposed double-weighted
- No
- Reserve for an output with double weighting
- No
- Additional information
- The paper is based on two strong conference publications and appears in the Journal of Computer Security, one of the top three journals in the area. The paper proposes several efficient techniques for determining how best to implement the cryptographic enforcement of an information flow policy.
- Author contribution statement
- -
- Non-English
- No
- English abstract
- -