Assigning cryptographic keys to access control in a multi-attribute hierarchy | IEEE Conference Publication | IEEE Xplore