Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Hwang, MS | en_US |
dc.contributor.author | Tzeng, WG | en_US |
dc.contributor.author | Yang, WP | en_US |
dc.date.accessioned | 2014-12-08T15:02:57Z | - |
dc.date.available | 2014-12-08T15:02:57Z | - |
dc.date.issued | 1996 | en_US |
dc.identifier.issn | 0167-4048 | en_US |
dc.identifier.uri | http://hdl.handle.net/11536/1553 | - |
dc.identifier.uri | http://dx.doi.org/10.1016/0167-4048(95)00028-3 | en_US |
dc.description.abstract | In this paper we propose a new dynamic access control method for the computer system with frequently inserted, deleted and updated users/files. Our method, based on the concepts of the access control matrix, key-lock-pair, time stamp and Chinese remainder theorem, associates each user with a user key and a user lock and each tile with a file key and a file lock Our method can achieve the following four goals. (1) By a simple module operation on the keys and locks of the user and the file, we can reveal the access right of a user to a file. (2) When a user/file is added to the computer system, we only assign a key and a lock to the user/file without affecting the keys and locks of the other users/files in the system. (3) When a user/file is deleted from the computer system, we simply erase the entry of the user/file in the computer system. (4) When the access right of a user to a file is updated, we merely modify the key and lock of the user or the file without affecting the keys and locks of the other users/files in the system. The main contribution of our method is that the action of inserting, deleting a user/file, or updating the access right of a user to a file can be done by modifying only one key and one lock, which could not be achieved simultaneously before. | en_US |
dc.language.iso | en_US | en_US |
dc.subject | access control matrix | en_US |
dc.subject | Chinese remainder theorem | en_US |
dc.subject | dynamic | en_US |
dc.subject | key-lock-pair | en_US |
dc.subject | time stamp | en_US |
dc.title | An access control scheme based on Chinese remainder theorem and time stamp concept | en_US |
dc.type | Article | en_US |
dc.identifier.doi | 10.1016/0167-4048(95)00028-3 | en_US |
dc.identifier.journal | COMPUTERS & SECURITY | en_US |
dc.citation.volume | 15 | en_US |
dc.citation.issue | 1 | en_US |
dc.citation.spage | 73 | en_US |
dc.citation.epage | 81 | en_US |
dc.contributor.department | 資訊工程學系 | zh_TW |
dc.contributor.department | Department of Computer Science | en_US |
dc.identifier.wosnumber | WOS:A1996UC56500010 | - |
dc.citation.woscount | 5 | - |
Appears in Collections: | Articles |
Files in This Item:
If it is a zip file, please download the file and unzip it, then open index.html in a browser to view the full text content.