A DYNAMIC ACCESS-CONTROL SCHEME BASED UPON THE KNAPSACK-PROBLEM

被引:1
|
作者
JAN, JK [1 ]
WANG, SJ [1 ]
机构
[1] NATL TAIWAN UNIV,DEPT ELECT ENGN,TAIPEI 106,TAIWAN
关键词
ACCESS CONTROL; CRYPTOSYSTEM; INFORMATION PROTECTION SYSTEM; KNAPSACK PROBLEM;
D O I
10.1016/0898-1221(93)90061-Y
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
A new dynamic access control scheme for information protection systems is proposed in this paper. The main idea of it is inspired by the concept of the trapdoor knapsack problem proposed by Merkle and Hellman. Since the knapsack problem is an NP-complete problem, the security of access control is achieved henceforth. Our scheme associates each user with some user keys and each file with some file keys. There is a positive integer set of S'; through a simple formula on keys and S', the corresponding access privilege can be easily revealed in the protection system. Moreover, by employing our scheme, insertion or deletion of the user/file can be processed effectively with only a few previously defined keys and locks required to be modified.
引用
收藏
页码:75 / 86
页数:12
相关论文
共 50 条
  • [11] CRYPTOGRAPHIC SOLUTION TO A PROBLEM OF ACCESS-CONTROL IN A HIERARCHY
    AKL, SG
    TAYLOR, PD
    ACM TRANSACTIONS ON COMPUTER SYSTEMS, 1983, 1 (03): : 239 - 248
  • [12] PACKET LEVEL ACCESS-CONTROL SCHEME FOR INTERNETWORK SECURITY
    IQBAL, MS
    POON, FSF
    IEE PROCEEDINGS-I COMMUNICATIONS SPEECH AND VISION, 1992, 139 (02): : 165 - 175
  • [13] CRYPTOGRAPHIC KEY ASSIGNMENT SCHEME FOR ACCESS-CONTROL IN A HIERARCHY
    CHANG, CC
    HWANG, RJ
    WU, TC
    INFORMATION SYSTEMS, 1992, 17 (03) : 243 - 247
  • [14] ANALYSIS AND IMPROVEMENT OF AN ACCESS-CONTROL SCHEME WITH USER AUTHENTICATION
    YEN, SM
    LAIH, CS
    IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1994, 141 (05): : 271 - 273
  • [15] Dynamic access-control policies on XML encrypted data
    Bouganim, Luc
    Ngoc, Francois Dang
    Pucheral, Philippe
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2008, 10 (04)
  • [16] MODIFIED CHANG-HWANG-WU ACCESS-CONTROL SCHEME
    HWANG, MS
    YANG, WP
    CHANG, CC
    ELECTRONICS LETTERS, 1993, 29 (24) : 2095 - 2096
  • [17] OPTIMAL FILE ALLOCATION IN A COMPUTER NETWORK - A SOLUTION METHOD BASED ON THE KNAPSACK-PROBLEM
    CERI, S
    MARTELLA, G
    PELAGATTI, G
    COMPUTER NETWORKS AND ISDN SYSTEMS, 1982, 6 (05): : 345 - 357
  • [18] A CRYPTOGRAPHIC IMPLEMENTATION FOR DYNAMIC ACCESS-CONTROL IN A USER HIERARCHY
    TSAI, HM
    CHANG, CC
    COMPUTERS & SECURITY, 1995, 14 (02) : 159 - 166
  • [19] Specifying and reasoning about dynamic access-control policies
    Dougherty, Daniel J.
    Fisler, Kathi
    Krishnamurthi, Shriram
    AUTOMATED REASONING, PROCEEDINGS, 2006, 4130 : 632 - 646
  • [20] LATTICE-BASED ACCESS-CONTROL MODELS
    SANDHU, RS
    COMPUTER, 1993, 26 (11) : 9 - 19