A New Access Control Method Using Prime Factorisation

نویسندگان

  • J.-J. Hwang
  • B.-M. Shao
  • P. C. Wang
چکیده

Based on prime factorisation in number theory, a new but simple and efficient protection method for access control is proposed. This method has several advantages on performance over previous methods in the literature. Especially, a file I user can be added to or removed from the system without much effort. Excellence of this method is more pronounced for those systems where files are accessible to only a few users.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A novel access control method using Morton number and prime factorization

A novel scheme used for controlling access requests in security information system is proposed. In the proposed method, the system administrator chooses distinct prime numbers representing each atomic access right as well as four large prime numbers for encryption. By setting these representative prime numbers as input parameters, the proposed method applies a one-way function combining the Mor...

متن کامل

Collaborative Filtering with Side Information: a Gaussian Process Perspective

We introduce the Tucker Gaussian Process (TGP), a model for regression that regularises a Gaussian Process (GP) towards simpler regression functions for enhanced generalisation performance. We derive it using a novel approach to scalable GP learning, and show that our model is particularly well-suited to grid-structured data and problems where the dependence on covariates is close to being sepa...

متن کامل

A Note on Unique Factorisation of Communicating Processes

Milner and Moller (1993) have shown that processes that are expressible in a language with action preex, choice and an operation k for parallel composition by means of pure interleaving have the unique factorisation principle: every process can be uniquely factorised into a parallel composition of parallel prime components. In this note we consider a language that is slightly more general in tw...

متن کامل

A model for specification, composition and verification of access control policies and its application to web services

Despite significant advances in the access control domain, requirements of new computational environments like web services still raise new challenges. Lack of appropriate method for specification of access control policies (ACPs), composition, verification and analysis of them have all made the access control in the composition of web services a complicated problem. In this paper, a new indepe...

متن کامل

Atomic Latin Squares based on Cyclotomic Orthomorphisms

Atomic latin squares have indivisible structure which mimics that of the cyclic groups of prime order. They are related to perfect 1-factorisations of complete bipartite graphs. Only one example of an atomic latin square of a composite order (namely 27) was previously known. We show that this one example can be generated by an established method of constructing latin squares using cyclotomic or...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Comput. J.

دوره 35  شماره 

صفحات  -

تاریخ انتشار 1992