A binary access control scheme with high data security.

An access control scheme for implementing the access matrix is presented. The proposed scheme is based upon binary form of access rights. In this scheme each user is assigned one key. The keys are possessed by the users and can be used to derive the access rights to the files. In this scheme attenti...

Full description

Saved in:
Bibliographic Details
Main Authors: Islam, Md. Rafiqul, Md. Sap, Mohd. Noor
Format: Article
Language:en
Published: Penerbit UTM Press 2002
Subjects:
Online Access:http://eprints.utm.my/8545/1/MohdNoorMdSap2002_ABinaryAccessControlScemeWithHigh.PDF
http://eprints.utm.my/8545/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1845472027803123712
author Islam, Md. Rafiqul
Md. Sap, Mohd. Noor
author_facet Islam, Md. Rafiqul
Md. Sap, Mohd. Noor
author_sort Islam, Md. Rafiqul
building UTM Library
collection Institutional Repository
content_provider Universiti Teknologi Malaysia
content_source UTM Institutional Repository
continent Asia
country Malaysia
description An access control scheme for implementing the access matrix is presented. The proposed scheme is based upon binary form of access rights. In this scheme each user is assigned one key. The keys are possessed by the users and can be used to derive the access rights to the files. In this scheme attention has been given to the access information (keys of the users) itself This scheme is more effective and efficient for the systems where files are accessible to only limited number of users.
format Article
id my.utm.eprints-8545
institution Universiti Teknologi Malaysia
language en
publishDate 2002
publisher Penerbit UTM Press
record_format eprints
spelling my.utm.eprints-85452017-11-01T04:17:42Z http://eprints.utm.my/8545/ A binary access control scheme with high data security. Islam, Md. Rafiqul Md. Sap, Mohd. Noor QA75 Electronic computers. Computer science An access control scheme for implementing the access matrix is presented. The proposed scheme is based upon binary form of access rights. In this scheme each user is assigned one key. The keys are possessed by the users and can be used to derive the access rights to the files. In this scheme attention has been given to the access information (keys of the users) itself This scheme is more effective and efficient for the systems where files are accessible to only limited number of users. Penerbit UTM Press 2002-12 Article PeerReviewed application/pdf en http://eprints.utm.my/8545/1/MohdNoorMdSap2002_ABinaryAccessControlScemeWithHigh.PDF Islam, Md. Rafiqul and Md. Sap, Mohd. Noor (2002) A binary access control scheme with high data security. Jurnal Teknologi Maklumat, 14 (2). pp. 8-16. ISSN 0128-3790
spellingShingle QA75 Electronic computers. Computer science
Islam, Md. Rafiqul
Md. Sap, Mohd. Noor
A binary access control scheme with high data security.
title A binary access control scheme with high data security.
title_full A binary access control scheme with high data security.
title_fullStr A binary access control scheme with high data security.
title_full_unstemmed A binary access control scheme with high data security.
title_short A binary access control scheme with high data security.
title_sort binary access control scheme with high data security.
topic QA75 Electronic computers. Computer science
url http://eprints.utm.my/8545/1/MohdNoorMdSap2002_ABinaryAccessControlScemeWithHigh.PDF
http://eprints.utm.my/8545/
url_provider http://eprints.utm.my/