Operating system concepts (2nd ed.)
Operating system concepts (2nd ed.)
File servers for network-based distributed systems
ACM Computing Surveys (CSUR)
Andrew: a distributed personal computing environment
Communications of the ACM - The MIT Press scientific computation series
ACM Transactions on Computer Systems (TOCS)
A comparison of two network-based file servers
Communications of the ACM
Protection and the control of information sharing in multics
Communications of the ACM
A hardware architecture for implementing protection rings
Communications of the ACM
An Introduction to Database Systems
An Introduction to Database Systems
SOSP '81 Proceedings of the eighth ACM symposium on Operating systems principles
ACM SIGOPS Operating Systems Review
A hierarchical single-key-lock access control using the Chinese remainder theorem
SAC '92 Proceedings of the 1992 ACM/SIGAPP Symposium on Applied computing: technological challenges of the 1990's
Managing user relationships in hierarchies for information system security
Decision Support Systems
Protecting the content integrity of digital imagery with fidelity preservation
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
Hi-index | 14.98 |
A binary coding method was invented and has been applied to the single-key-lock (SKL) system which achieves access control by associating with each accesser only one key and with each resource only one lock. The new system is called the binary single-key-lock (BSKL) system. In both the SKL and BSKL systems, through operations on the single-key-lock pair, the control information can be revealed. On the basis of the new binary coding method, and because binary operations are much faster, better performance for such an access control system can be achieved. The increased extensibility of the modification is also discussed.