Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | CHANG, CC | en_US |
dc.contributor.author | WU, TC | en_US |
dc.date.accessioned | 2014-12-08T15:04:42Z | - |
dc.date.available | 2014-12-08T15:04:42Z | - |
dc.date.issued | 1993-01-01 | en_US |
dc.identifier.issn | 0306-4573 | en_US |
dc.identifier.uri | http://dx.doi.org/10.1016/0306-4573(93)90023-7 | en_US |
dc.identifier.uri | http://hdl.handle.net/11536/3194 | - |
dc.description.abstract | A new mechanism used for controlling the access requests in information systems is proposed. In our scheme, each access privilege associates to a recursively generated function based on Newton's interpolating polynomial. The insertion of a new user/file into the system and deletion of an old user/file from the system can be easily implemented. Besides, the updating of a privilege of a user to a file can also be successfully implemented without reconstructing all associated functions. | en_US |
dc.language.iso | en_US | en_US |
dc.subject | INFORMATION PROTECTION SYSTEM | en_US |
dc.subject | ACCESS CONTROL | en_US |
dc.subject | SINGLE-KEY-LOCK SYSTEM (SKL) | en_US |
dc.subject | NEWTON INTERPOLATING POLYNOMIAL | en_US |
dc.title | CONTROLLING THE ACCESS REQUESTS IN AN INFORMATION PROTECTION SYSTEM | en_US |
dc.type | Article | en_US |
dc.identifier.doi | 10.1016/0306-4573(93)90023-7 | en_US |
dc.identifier.journal | INFORMATION PROCESSING & MANAGEMENT | en_US |
dc.citation.volume | 29 | en_US |
dc.citation.issue | 1 | en_US |
dc.citation.spage | 61 | en_US |
dc.citation.epage | 68 | en_US |
dc.contributor.department | 資訊科學與工程研究所 | zh_TW |
dc.contributor.department | Institute of Computer Science and Engineering | en_US |
dc.identifier.wosnumber | WOS:A1993KK11500005 | - |
dc.citation.woscount | 0 | - |
Appears in Collections: | Articles |