期刊文献+

一种新的双钥-锁对访问控制方案

A New Two-key-lock-pair Access Control Scheme
下载PDF
导出
摘要 针对钥-锁对访问控制方案存在的问题,基于整数二进制表示的唯一性,该文提出了一种新的双钥—锁对访问控制方案。该方案实现简单,有良好的动态特性,从系统删除一个用户(文件)时,不必保留用户(文件)行的任何信息,而直接将之删除,提高了空间利用率。而所有的双钥-锁对访问控制方案都存在严重的溢出问题,且在实现用户对文件的多种访问权限时,均假设权限具有递增关系,这使得访问控制系统不适合对文件进行细粒度保护。该方案实现了用户对文件的多种访问控制权限,并减少了溢出问题的发生。 All the two-key-lock-pair access control schemes are threatened by overflow problem. Besides that, under old scheme, user can own several kinds of right on one file only based on the supposition that the access right is increased by degrees.T o overcome the shortcoming of key-lock-pair access control scheme at present, a new two-key-lock-pair access control scheme is proposed, based on the property that integer can be denoted into only one binary digital. With perfect dynamic feature, the new scheme is simply realized. When a user (file) is deleted by system, it is no need to keep any information about the user (file). Thus, the efficiency of space usage is increased. Under new access control scheme, user can own several kinds of access right upon one file, and the possibility of overflow problem is significantly reduced with the new method.
作者 吴英姣
出处 《计算机工程》 CAS CSCD 北大核心 2007年第12期180-182,共3页 Computer Engineering
关键词 访问控制 二进制 双钥-锁对 时间戳 Access control Binary Two-key-lock-pair Time stamp
  • 相关文献

参考文献7

  • 1俞诗曼.基于角色访问控制的理论与应用研究[D].北京:北京大学,2003:1-5
  • 2Graham G S,Denning P J.Protection-Principle and Practice[C]//Proc.of Spring Joint Computer Conference.1972:417-429.
  • 3Yang Geng,Rong Chunming,Dai Yueping.A Distribute Honeypots for Grid Security[C]//Proc.of 2nd Int.Workshop on Grid and Cooperative Computing.2004.
  • 4Zhou Quan,Yang Geng.A Grid Portal Model Based on Security and Storage Resourece Proxy[C]//Proc.of International Conference on Computational and Information Sciences.2004.
  • 5Chang C C,Jan J K.An Access Control Scheme for New User and Files[J].International Journal of Policy Information,1988,12(2):89-98.
  • 6乔颖,须德,戴国忠.一种基于角色访问控制(RBAC)的新模型及其实现机制[J].计算机研究与发展,2000,37(1):37-44. 被引量:75
  • 7姬东耀,王育民.一种基于中国剩余定理的双重认证存取控制方案[J].计算机研究与发展,2000,37(4):465-469. 被引量:4

二级参考文献10

  • 1Chang C C,Inform Sci,1997年,96卷,1-2期,15页
  • 2Hw ang M S,Computers Security,1996年,15卷,1期,73页
  • 3Hw ang M S,IEICE Trans Inf Syst,1994年,77卷,9期,1042页
  • 4Hwang J J,Computer J,1992年,35卷,1期,16页
  • 5Chang C C,Int J Policy Information,1988年,12卷,2期,89页
  • 6Chang C C,BIT,1986年,26卷,410页
  • 7Wu M L,IEEE Trans on Software Engineering,1984年,10卷,2期,185页
  • 8Hwang M S,IEICE Transon Information System EDE,1994年,77卷,9期,1042页
  • 9Hwang J J,Computer J,1992年,35卷,1期,16页
  • 10Chang C K,IEEE Trans Computer,1989年,38卷,10期,1462页

共引文献77

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部