An access control scheme based on Chinese remainder theorem and time stamp concept

被引:7
|
作者
Hwang, MS [1 ]
Tzeng, WG [1 ]
Yang, WP [1 ]
机构
[1] MINIST TRANSPORTAT & COMMUN, TELECOMMUN LABS, CHUNGLI 320, TAIWAN
关键词
access control matrix; Chinese remainder theorem; dynamic; key-lock-pair; time stamp;
D O I
10.1016/0167-4048(95)00028-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we propose a new dynamic access control method for the computer system with frequently inserted, deleted and updated users/files. Our method, based on the concepts of the access control matrix, key-lock-pair, time stamp and Chinese remainder theorem, associates each user with a user key and a user lock and each tile with a file key and a file lock Our method can achieve the following four goals. (1) By a simple module operation on the keys and locks of the user and the file, we can reveal the access right of a user to a file. (2) When a user/file is added to the computer system, we only assign a key and a lock to the user/file without affecting the keys and locks of the other users/files in the system. (3) When a user/file is deleted from the computer system, we simply erase the entry of the user/file in the computer system. (4) When the access right of a user to a file is updated, we merely modify the key and lock of the user or the file without affecting the keys and locks of the other users/files in the system. The main contribution of our method is that the action of inserting, deleting a user/file, or updating the access right of a user to a file can be done by modifying only one key and one lock, which could not be achieved simultaneously before.
引用
收藏
页码:73 / 81
页数:9
相关论文
共 50 条
  • [21] An Efficient Location Privacy Protection Scheme Based on the Chinese Remainder Theorem
    Wang, Jingjing
    Han, Yiliang
    Yang, Xiaoyuan
    TSINGHUA SCIENCE AND TECHNOLOGY, 2016, 21 (03) : 260 - 269
  • [22] Publicly verifiable secret sharing scheme based on the Chinese Remainder Theorem
    Jia, Xingxing
    Wang, Daoshun
    Wu, Yujiang
    ADVANCES IN MECHATRONICS AND CONTROL ENGINEERING, PTS 1-3, 2013, 278-280 : 1945 - +
  • [23] An Efficient Location Privacy Protection Scheme Based on the Chinese Remainder Theorem
    Jingjing Wang
    Yiliang Han
    Xiaoyuan Yang
    TsinghuaScienceandTechnology, 2016, 21 (03) : 260 - 269
  • [24] Study of a Scheme of Bid Evaluation by Experts Based on Chinese Remainder Theorem
    Sun, Xiaohan
    APPLIED INFORMATICS AND COMMUNICATION, PT I, 2011, 224 : 373 - 377
  • [25] An Efficient Rational Secret Sharing Scheme Based on the Chinese Remainder Theorem
    Zhang, Yun
    Tartary, Christophe
    Wang, Huaxiong
    INFORMATION SECURITY AND PRIVACY, 2011, 6812 : 259 - +
  • [26] Improvement And Research of Group Signature Scheme Based on Chinese Remainder Theorem
    Qi, Ai-qin
    Shen, Yong-jun
    Proceedings of the 2016 3rd International Conference on Mechatronics and Information Technology (ICMIT), 2016, 49 : 55 - 58
  • [27] Digital signature scheme for ad hoc based on Chinese remainder theorem
    Li, Hongwei
    Yang, Shoubao
    Huang, Meisun
    Ren, Anxi
    Jisuanji Gongcheng/Computer Engineering, 2006, 32 (02): : 153 - 155
  • [28] Study of a Scheme of Bid Evaluation by Experts Based on Chinese Remainder Theorem
    Sun, Xiaohan
    2010 THE 3RD INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION (PACIIA2010), VOL I, 2010, : 213 - 215
  • [29] An efficient generalized secret sharing scheme based on Chinese Remainder Theorem
    Chang, Chin-Chen
    Yang, Jen-Ho
    PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON INFORMATION AND MANAGEMENT SCIENCES, 2006, 5 : 333 - 336
  • [30] Deterministic Grant-Free Access based on the Chinese Remainder Theorem
    Lo, Yuan-Hsun
    Wong, Tsai-Lien
    Zhang, Yijin
    Wang, Yu-Chun
    Xu, Kangkang
    ICC 2023-IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2023, : 4767 - 4772