Abstract
A new access control scheme for the growth of users and files in file protection systems is proposed. Our scheme associates each user with a user key and each file with a file key. For each key, there are some corresponding locks, that can be extracted from a nonsingular matrix. Through simple operations on keys and locks, privacy decisions of the protection system can easily be revealed. Furthermore, by employing our method, whenever a new user or file is joined, the corresponding key values and lock values will be determined immediately without changing any previously defined keys and locks.
Similar content being viewed by others
References
R. W. Conway, W. L. Maxwell and H. C. Morgan,On the implementation of security measures in information system, Comm. of ACM, Vol. 15, No. 4, April 1972, pp. 211–220.
C. C. Chang,On the design of a key-lock-pair mechanism in information protection systems, BIT, Vol. 26, 1986, pp. 410–417.
C. C. Chang and C. P. Chen,A key-lock-pair mechanism based upon generalized Chinese remainder theorem, Journal of Chinese Institute of Engineering, Vol. 9, No. 4, 1986, pp. 383–390.
G. S. Graham and P. J. Denning,Protection-principles and practice, Proc. AFIPS 1972 SJCC, Vol. 40, pp. 417–429.
M. L. Wu and T. Y. Hwang,Access control with single-key-lock, IEEE Trans. on Software Engineering, Vol. SE-10, No. 2, 1984, pp. 185–191.
Author information
Authors and Affiliations
Rights and permissions
About this article
Cite this article
Jan, J.K., Chang, C.C. A key-lock-pair oriented access control scheme for the growth of users and files. BIT 33, 382–389 (1993). https://doi.org/10.1007/BF01990521
Received:
Revised:
Issue Date:
DOI: https://doi.org/10.1007/BF01990521