An information protection scheme based upon number theory
The Computer Journal
A Binary Single-Key-Lock System for Access Control
IEEE Transactions on Computers
On the Design of a Single-Key-Lock Mechanism Based on Newton's Interpolating Polynomial
IEEE Transactions on Software Engineering
A new access control method using prime factorisation
The Computer Journal - Special issue on safety and security parallel computation
A new dynamic access control scheme based on subject-object list
Data & Knowledge Engineering
A scheme to determine the relationship between two users in a hierarchy
Computers and Security
Distributed assignment of cryptographic keys for access control in a hierarchy
Computers and Security
A binary access control method using prime factorization
Information Sciences: an International Journal
Decision Support Systems - Special issue: intranets and intranetworking
Computer security
Protection and the control of information sharing in multics
Communications of the ACM
A hardware architecture for implementing protection rings
Communications of the ACM
The structure of the “THE”-multiprogramming system
Communications of the ACM
Decision Support Systems - Special issue for business to business electronic commerce, issues and solutions
A novel access control method using Morton number and prime factorization
Information Sciences: an International Journal
Cryptography and data security
Cryptography and data security
Key assignment for enforcing access control policy exceptions in distributed systems
Information Sciences: an International Journal
A Dynamic Mechanism for Determining Relationships in a Partially Ordered User Hierarchy
AINA '04 Proceedings of the 18th International Conference on Advanced Information Networking and Applications - Volume 2
Evaluating information assurance strategies
Decision Support Systems
Protection: principles and practice
AFIPS '72 (Spring) Proceedings of the May 16-18, 1972, spring joint computer conference
Access Control with Single-Key-Lock
IEEE Transactions on Software Engineering
Design of a lattice-based access control scheme
SMC'09 Proceedings of the 2009 IEEE international conference on Systems, Man and Cybernetics
Hi-index | 0.00 |
Hierarchies are an important concept in information protection systems. The uses of hierarchies in the security domain of computer information systems include access hierarchies, levels of abstraction in security kernels, multi-level security, and user hierarchies, among others. Using user hierarchies as an example, this paper proposes a new protection mechanism to achieve the key-to-key (KTK) security policy wherein each user in the hierarchy is assigned a key pair and the relationship between any two users can be revealed through an operation on their corresponding keys. In addition to the security provided by the policy, the new mechanism manifests several advantages over the previous methods in the literature. Among its merits are (1) simple and quick operations performed to determine user relationships, (2) less storage requirements, and (3) a high degree of dynamism that allows easy addition and deletion of user keys without affecting most of the existing keys in the user hierarchy. The relevance of the new KTK scheme to organizations and its implications for potential business applications are also discussed.