Abstract
Access control is one of the sezious problems in modern information system. In this paper we suggest a key-lock strategy to represent the privilege relationship involving linear transformations and nonlinear conetraints. The implementation shows that this strategy has got the properties of security, and information hidden, and satisfies the least privilege principle. This distributed management of sensitive data adapts the distributed systems well.
Similar content being viewed by others
Explore related subjects
Discover the latest articles and news from researchers in related subjects, suggested using machine learning.References
E. L. Leiss, Principles of Data Security, Plenum Press, New York, 1982.
J. L. Peterson & A. Silberschatz, Operating System Concepts, Addison-Wesley Pub., Inc., 1983.
M. L. Wu & T. Y. Hwang, Access control with single-key-lock,IEEE Trans. on SE-10: 2 (1984), 185–190.
D. E. R. Denning, Cryptography and Data Security, Addison-Wesley Pub., Inc. 1981.
Xie Bangjie, Linear Algebra, Peoples Education Press, 1978.
Φ. P. Γ AHTMAXEP, Matrix Theory, College Education Press, 1955.
Author information
Authors and Affiliations
Rights and permissions
About this article
Cite this article
Huang, G., Liu, J. A key-lock access control. J. of Comput. Sci. & Technol. 2, 236–243 (1987). https://doi.org/10.1007/BF02973508
Received:
Revised:
Issue Date:
DOI: https://doi.org/10.1007/BF02973508