TY - JOUR
T1 - Novel access control method using Morton number and prime factorization
AU - Chang, Henry Ker Chang
AU - Hwang, Jing Jang
AU - Liu, Hsing Hua
PY - 2000/12
Y1 - 2000/12
N2 - A novel scheme used for controlling access requests in security information system is proposed. In the proposed method, the system administrator chooses distinct prime numbers representing each atomic access right as well as four large prime numbers for encryption. By setting these representative prime numbers as input parameters, the proposed method applies a one-way function combining the Morton number theory transferring into a single value to derive the encrypted compound privilege (ECP). With ECP, verification of right of access can be achieved easily and secretly. Meanwhile, the proposed scheme provides the following advantages: (1) the verification of right of access can be effectively implemented using the Morton sequence with coordinate transformation; (2) the problem of dynamic access control also can be effectively implemented; (3) integrity and confidentiality while controlling system resources can be ensured; (4) the proposed method can decrease the redundancy of the access matrix in some specific circumstances.
AB - A novel scheme used for controlling access requests in security information system is proposed. In the proposed method, the system administrator chooses distinct prime numbers representing each atomic access right as well as four large prime numbers for encryption. By setting these representative prime numbers as input parameters, the proposed method applies a one-way function combining the Morton number theory transferring into a single value to derive the encrypted compound privilege (ECP). With ECP, verification of right of access can be achieved easily and secretly. Meanwhile, the proposed scheme provides the following advantages: (1) the verification of right of access can be effectively implemented using the Morton sequence with coordinate transformation; (2) the problem of dynamic access control also can be effectively implemented; (3) integrity and confidentiality while controlling system resources can be ensured; (4) the proposed method can decrease the redundancy of the access matrix in some specific circumstances.
UR - http://www.scopus.com/inward/record.url?scp=0034503923&partnerID=8YFLogxK
U2 - 10.1016/S0020-0255(00)00073-6
DO - 10.1016/S0020-0255(00)00073-6
M3 - 文章
AN - SCOPUS:0034503923
SN - 0020-0255
VL - 130
SP - 23
EP - 40
JO - Information Sciences
JF - Information Sciences
IS - 1-4
ER -