Full metadata record
DC FieldValueLanguage
dc.contributor.authorHwang, MSen_US
dc.contributor.authorTzeng, WGen_US
dc.contributor.authorYang, WPen_US
dc.date.accessioned2014-12-08T15:02:57Z-
dc.date.available2014-12-08T15:02:57Z-
dc.date.issued1996en_US
dc.identifier.issn0167-4048en_US
dc.identifier.urihttp://hdl.handle.net/11536/1553-
dc.identifier.urihttp://dx.doi.org/10.1016/0167-4048(95)00028-3en_US
dc.description.abstractIn this paper we propose a new dynamic access control method for the computer system with frequently inserted, deleted and updated users/files. Our method, based on the concepts of the access control matrix, key-lock-pair, time stamp and Chinese remainder theorem, associates each user with a user key and a user lock and each tile with a file key and a file lock Our method can achieve the following four goals. (1) By a simple module operation on the keys and locks of the user and the file, we can reveal the access right of a user to a file. (2) When a user/file is added to the computer system, we only assign a key and a lock to the user/file without affecting the keys and locks of the other users/files in the system. (3) When a user/file is deleted from the computer system, we simply erase the entry of the user/file in the computer system. (4) When the access right of a user to a file is updated, we merely modify the key and lock of the user or the file without affecting the keys and locks of the other users/files in the system. The main contribution of our method is that the action of inserting, deleting a user/file, or updating the access right of a user to a file can be done by modifying only one key and one lock, which could not be achieved simultaneously before.en_US
dc.language.isoen_USen_US
dc.subjectaccess control matrixen_US
dc.subjectChinese remainder theoremen_US
dc.subjectdynamicen_US
dc.subjectkey-lock-pairen_US
dc.subjecttime stampen_US
dc.titleAn access control scheme based on Chinese remainder theorem and time stamp concepten_US
dc.typeArticleen_US
dc.identifier.doi10.1016/0167-4048(95)00028-3en_US
dc.identifier.journalCOMPUTERS & SECURITYen_US
dc.citation.volume15en_US
dc.citation.issue1en_US
dc.citation.spage73en_US
dc.citation.epage81en_US
dc.contributor.department資訊工程學系zh_TW
dc.contributor.departmentDepartment of Computer Scienceen_US
dc.identifier.wosnumberWOS:A1996UC56500010-
dc.citation.woscount5-
Appears in Collections:Articles


Files in This Item:

  1. A1996UC56500010.pdf

If it is a zip file, please download the file and unzip it, then open index.html in a browser to view the full text content.