期刊文献+

一种新的单钥-锁对访问控制方案

New Single-Key-Lock-Pair Access Control Scheme
下载PDF
导出
摘要 针对现有单钥-锁对访问控制方案存在严重的溢出问题,基于整数二进制表示的唯一性,提出了一种新的单钥-锁对访问控制方案。新的方案实现简单,除了具有一般单钥-锁对方案的良好动态特性外,还在不需要访问权限递增假设下,实现了用户对文件的多种访问控制权限,并大大减小了溢出问题的发生。 To overcome the shortcoming of single-key-lock-pair access control scheme at present, a new single-key-lock-pair access control scheme is proposed, based on the property that a integer can be denoted into only one binary digital. All the single-key-lock-pair access control scheme are threaten by overflow problem. Besides that, under old scheme, user can own several kinds of right on one file only based on the supposition that the access rights is increase by degrees. With perfect dynamic feature, the new scheme is simply realized. Under new access control scheme, user can own several kinds of access right upon one file under the new scheme without the supposition that the access rights is increase by degrees, and the possibility of overflow problem is significantly reduced by our new method.
作者 卿利 朱清新
出处 《电子科技大学学报》 EI CAS CSCD 北大核心 2003年第6期692-695,721,共5页 Journal of University of Electronic Science and Technology of China
关键词 访问控制 二进制 单钥-锁对 溢出问题 访问权限 access control binary single-key-lock-pair overflow problem access right
  • 相关文献

参考文献9

  • 1[1]Graham G S, Denning P J. Protection-principle and practice[C]. In Proc. AFTPS 1972 SJCC, 1972, 40:417-429 被引量:1
  • 2[2]Denning D E R. Cryptography, Security D[M]. Addison-Wesley, Mass., 1982 被引量:1
  • 3[3]Wu M L, Hwang T Y. Access control with single-key-lock[J]. IEEE Trans. Software Eng., 1984, 10(2): 185-191 被引量:1
  • 4[4]Chang C C. On the design of a key-lock-pair mechanism in information protection systems[C]. BIT, 1986, 26: 410-417 被引量:1
  • 5[5]Chang C C. An information protection scheme based upon number theory[J]. Computer J., 1987, 30(3): 249-253 被引量:1
  • 6[6]Laih C S, Harn L, Lee J Y. On the design of a single-key-lock mechanism based on Newton's interpolating polynomial[J]. IEEE Trans. Software Eng., 1989, 15(9): 1 135-1 137 被引量:1
  • 7[7]Hwang J J, Shao B M, Wang P C. A new access control method using prime factorization[J]. Computer J., 1992, 35(1):16-20 被引量:1
  • 8[8]Chang, C C, Lou D C. A binary access control method using prime factorization[J]. Information Science, 1997,96(1-2): 15-26 被引量:1
  • 9[9]Chang C C, Jan J K. An access control scheme for new user and files[J]. International Journal of Policy Information,1988, 12(2): 89-98 被引量:1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部