A SCHEME TO DETERMINE THE RELATIONSHIP BETWEEN 2 USERS IN A HIERARCHY

被引:8
作者
CHANG, CC [1 ]
JAN, JK [1 ]
BUEHRER, DJ [1 ]
机构
[1] NATL CHUNGHSING UNIV,INST APPL MATH,TAICHUNG,TAIWAN
关键词
USER HIERARCHY; KEY-TO-KEY METHOD; GALOIS FIELD ALGEBRA; RELATIONSHIPS; ACCESS PRIVILEGES;
D O I
10.1016/0167-4048(94)90079-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security systems are often organized into a hierarchy. For example, the file access privileges of a file system are often organized hierarchically, so that a user may access all of the files of users who are below him in the hierarchy. In this paper, we propose an improved user hierarchy scheme which is inspired by Wu and Hwang's key-to-key (KTK) method. In Wu and Hwang's KTK schemes, each user is assigned a key vector, and the relationship between any two users can be revealed by computing the product of the two users' corresponding key vectors. Their method, however, has only theoretical interest due to the difficulty of finding key vectors for users, the amount of storage needed for the vectors, and the impossibility of adding new users without reconstructing all of the key vectors. Although our method also assigns keys to users, the amount of storage space is drastically reduced, and a new user can be easily added through simple operations, without affecting the existing keys.
引用
收藏
页码:255 / 261
页数:7
相关论文
共 8 条
[1]  
CHANG C, 1985, J SCI ENG NCHU, V22, P183
[2]  
CHANG CC, 1987, OCT P INT C COMP SOF, P412
[3]  
CHANG CC, 1989, NOV P INT WORKSH DIS, P145
[4]  
CHANG CC, 1985, 1985 IMCS AS PAC REG, P441
[5]  
GRAHAM GS, 1972, SPR P JOINT COMP C, V40, P417
[6]   PROTECTION AND CONTROL OF INFORMATION SHARING IN MULTICS [J].
SALTZER, JH .
COMMUNICATIONS OF THE ACM, 1974, 17 (07) :388-402
[7]   PROTECTION OF INFORMATION IN COMPUTER SYSTEMS [J].
SALTZER, JH ;
SCHROEDER, MD .
PROCEEDINGS OF THE IEEE, 1975, 63 (09) :1278-1308
[8]   ACCESS-CONTROL WITH SINGLE-KEY-LOCK [J].
WU, ML ;
HWANG, TY .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1984, 10 (02) :185-191