An access control scheme based on Chinese remainder theorem and time stamp concept

被引:7
|
作者
Hwang, MS [1 ]
Tzeng, WG [1 ]
Yang, WP [1 ]
机构
[1] MINIST TRANSPORTAT & COMMUN, TELECOMMUN LABS, CHUNGLI 320, TAIWAN
关键词
access control matrix; Chinese remainder theorem; dynamic; key-lock-pair; time stamp;
D O I
10.1016/0167-4048(95)00028-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we propose a new dynamic access control method for the computer system with frequently inserted, deleted and updated users/files. Our method, based on the concepts of the access control matrix, key-lock-pair, time stamp and Chinese remainder theorem, associates each user with a user key and a user lock and each tile with a file key and a file lock Our method can achieve the following four goals. (1) By a simple module operation on the keys and locks of the user and the file, we can reveal the access right of a user to a file. (2) When a user/file is added to the computer system, we only assign a key and a lock to the user/file without affecting the keys and locks of the other users/files in the system. (3) When a user/file is deleted from the computer system, we simply erase the entry of the user/file in the computer system. (4) When the access right of a user to a file is updated, we merely modify the key and lock of the user or the file without affecting the keys and locks of the other users/files in the system. The main contribution of our method is that the action of inserting, deleting a user/file, or updating the access right of a user to a file can be done by modifying only one key and one lock, which could not be achieved simultaneously before.
引用
收藏
页码:73 / 81
页数:9
相关论文
共 50 条
  • [1] DYNAMIC ACCESS-CONTROL SCHEME BASED ON THE CHINESE REMAINDER THEOREM
    WU, TC
    WU, TS
    HE, WH
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 1995, 10 (02): : 92 - 99
  • [2] Efficient and Scalable Access Management Scheme Based on Chinese Remainder Theorem
    Hsiao, Tsung-Chih
    Huang, Yin-Tzu
    Huang, Yu-Min
    Chen, Tzer-Long
    Chen, Tzer-Shyong
    Wang, Sheng-De
    SENSORS AND MATERIALS, 2018, 30 (03) : 413 - 422
  • [3] Yet another attack on the chinese remainder theorem-based hierarchical access control scheme
    Liu, Niu
    Tang, Shaohua
    Xu, Lingling
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (07) : 1079 - 1095
  • [4] Hierarchical access control based on Chinese Remainder Theorem and symmetric algorithm
    Chen, TS
    Chung, YF
    COMPUTERS & SECURITY, 2002, 21 (06) : 565 - 570
  • [5] Hierarchical access control with time-bound constraints based upon Chinese remainder theorem
    Department of Applied Mathematics, National Chiayi University, No.300 Syuefu Rd., Chiayi City 60004, Taiwan
    WSEAS Trans. Inf. Sci. Appl., 2007, 6 (1251-1256): : 1251 - 1256
  • [6] An Information Hiding Scheme Based on Chinese Remainder Theorem
    Chen, Jinrui
    Liu, Kesheng
    Yan, Xuehu
    Liu, Hanlin
    Liu, Lintao
    Tan, Longdan
    2018 IEEE 3RD INTERNATIONAL CONFERENCE ON IMAGE, VISION AND COMPUTING (ICIVC), 2018, : 785 - 790
  • [7] A proactive secret sharing scheme based on Chinese remainder theorem
    Meng, Keju
    Miao, Fuyou
    Ning, Yu
    Huang, Wenchao
    Xiong, Yan
    Chang, Chin-Chen
    FRONTIERS OF COMPUTER SCIENCE, 2021, 15 (02)
  • [8] A proactive secret sharing scheme based on Chinese remainder theorem
    Keju MENG
    Fuyou MIAO
    Yu NING
    Wenchao HUANG
    Yan XIONG
    ChinChen CHANG
    Frontiers of Computer Science, 2021, (02) : 127 - 136
  • [9] A collaborative secret sharing scheme based on the Chinese Remainder Theorem
    Jia, Xingxing
    Song, Yixuan
    Wang, Daoshun
    Nie, Daxin
    Wu, Jinzhao
    MATHEMATICAL BIOSCIENCES AND ENGINEERING, 2019, 16 (03) : 1280 - 1299
  • [10] Sequential Secret Sharing Scheme Based on Chinese Remainder Theorem
    Singh, Nidhi
    Tentu, Appala Naidu
    Basit, Abdul
    Venkaiah, V. Ch.
    2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH, 2016, : 583 - 588