Back to Search
Start Over
An access control scheme based on Chinese remainder theorem and time stamp concept
- Source :
- Computers & Security. 15:73-81
- Publication Year :
- 1996
- Publisher :
- Elsevier BV, 1996.
-
Abstract
- In this paper we propose a new dynamic access control method for the computer system with frequently inserted, deleted and updated users/files. Our method, based on the concepts of the access control matrix, key-lock-pair, time stamp and Chinese remainder theorem, associates each user with a user key and a user lock and each file with a file key and a file lock. Our method can achieve the following four goals. 1.(1) By a simple modulo operation on the keys and locks of the user and the file, we can reveal the access right of a user to a file. 2.(2) When a user/file is added to the computer system, we only assign a key and a lock to the user/file without affecting the keys and locks of the other users/files in the system. 3.(3) When a user/file is deleted from the computer system, we simply erase the entry of the user/file in the computer system. 4.(4) When the access right of a user to a file is updated, we merely modify the key and lock of the user or the file without affecting the keys and locks of the other users/ files in the system. The main contribution of our method is that the action of inserting, deleting a user/file, or updating the access right of a user to a file can be done by modifying only one key and one lock, which could not be achieved simultaneously before.
- Subjects :
- General Computer Science
Computer science
Stub file
Class implementation file
computer.software_genre
Data file
Data_FILES
Versioning file system
SSH File Transfer Protocol
File system fragmentation
Indexed file
Database
Computer file
Device file
computer.file_format
Unix file types
Torrent file
File Control Block
Self-certifying File System
Journaling file system
Operating system
ZAP File
Fork (file system)
Timestamp
Law
computer
Subjects
Details
- ISSN :
- 01674048
- Volume :
- 15
- Database :
- OpenAIRE
- Journal :
- Computers & Security
- Accession number :
- edsair.doi...........17495dd522c29f2dab96cea54bddd235
- Full Text :
- https://doi.org/10.1016/0167-4048(95)00028-3