A DYNAMIC ACCESS-CONTROL SCHEME BASED UPON THE KNAPSACK-PROBLEM

被引:1
|
作者
JAN, JK [1 ]
WANG, SJ [1 ]
机构
[1] NATL TAIWAN UNIV,DEPT ELECT ENGN,TAIPEI 106,TAIWAN
关键词
ACCESS CONTROL; CRYPTOSYSTEM; INFORMATION PROTECTION SYSTEM; KNAPSACK PROBLEM;
D O I
10.1016/0898-1221(93)90061-Y
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
A new dynamic access control scheme for information protection systems is proposed in this paper. The main idea of it is inspired by the concept of the trapdoor knapsack problem proposed by Merkle and Hellman. Since the knapsack problem is an NP-complete problem, the security of access control is achieved henceforth. Our scheme associates each user with some user keys and each file with some file keys. There is a positive integer set of S'; through a simple formula on keys and S', the corresponding access privilege can be easily revealed in the protection system. Moreover, by employing our scheme, insertion or deletion of the user/file can be processed effectively with only a few previously defined keys and locks required to be modified.
引用
收藏
页码:75 / 86
页数:12
相关论文
共 50 条
  • [31] A Generalized Knapsack-Problem Based Decomposition Heuristic for Solving Multistage Stochastic Programs with Endogenous and/or Exogenous Uncertainties
    Zeng, Zuo
    Christian, Brianna
    Cremaschi, Selen
    INDUSTRIAL & ENGINEERING CHEMISTRY RESEARCH, 2018, 57 (28) : 9185 - 9199
  • [32] DOMAIN-BASED ACCESS-CONTROL FOR DISTRIBUTED COMPUTING SYSTEMS
    ROBINSON, DC
    SLOMAN, MS
    SOFTWARE ENGINEERING JOURNAL, 1988, 3 (05): : 161 - 170
  • [33] Distributed clinical data sharing via dynamic access-control policy transformation
    Rezaeibagha, Fatemeh
    Mu, Yi
    INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS, 2016, 89 : 25 - 31
  • [34] AN AUTHENTICATION-COMBINED ACCESS-CONTROL SCHEME USING A ONE-WAY FUNCTION
    WU, TC
    CHANG, CC
    YEH, YS
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 1994, 27 (05) : 63 - 70
  • [35] A KEY-LOCK-PAIR ORIENTED ACCESS-CONTROL SCHEME FOR THE GROWTH OF USERS AND FILES
    JAN, JK
    CHANG, CC
    BIT, 1993, 33 (03): : 382 - 389
  • [36] Authentication-doubled access control scheme based on compound problem
    Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 19 (07): : 49 - 52
  • [37] Task-and-role-based access-control model for computational grid
    龙涛
    JournalofChongqingUniversity(EnglishEdition), 2007, (04) : 249 - 255
  • [38] BPDAC: A Blockchain Based and Provenance Enabled Dynamic Access Control Scheme
    Sun, Lianshan
    Zhou, Danni
    Liu, Diandong
    Tang, Jingyan
    Li, Yang
    IEEE ACCESS, 2023, 11 : 142552 - 142568
  • [39] Blockchain-based decentralised access control scheme for dynamic hierarchies
    Pareek G.
    Purushothama B.R.
    International Journal of Information and Computer Security, 2021, 16 (3-4): : 324 - 354
  • [40] Access-Control Model of Super Business System Based on Business Entity
    Zhao, Bin
    Zheng, Guiyue
    Gao, Yilong
    Zhao, Yanchen
    ELECTRONICS, 2022, 11 (19)