A binary access control scheme with high data security.
An access control scheme for implementing the access matrix is presented. The proposed scheme is based upon binary form of access rights. In this scheme each user is assigned one key. The keys are possessed by the users and can be used to derive the access rights to the files. In this scheme attenti...
| Main Authors: | , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Penerbit UTM Press
2002
|
| Subjects: | |
| Online Access: | http://eprints.utm.my/8545/ http://eprints.utm.my/8545/1/MohdNoorMdSap2002_ABinaryAccessControlScemeWithHigh.PDF |
| _version_ | 1848891711666782208 |
|---|---|
| author | Islam, Md. Rafiqul Md. Sap, Mohd. Noor |
| author_facet | Islam, Md. Rafiqul Md. Sap, Mohd. Noor |
| author_sort | Islam, Md. Rafiqul |
| building | UTeM Institutional Repository |
| collection | Online Access |
| description | An access control scheme for implementing the access matrix is presented. The proposed scheme is based upon binary form of access rights. In this scheme each user is assigned one key. The keys are possessed by the users and can be used to derive the access rights to the files. In this scheme attention has been given to the access information (keys of the users) itself This scheme is more effective and efficient for the systems where files are accessible to only limited number of users. |
| first_indexed | 2025-11-15T21:02:19Z |
| format | Article |
| id | utm-8545 |
| institution | Universiti Teknologi Malaysia |
| institution_category | Local University |
| language | English |
| last_indexed | 2025-11-15T21:02:19Z |
| publishDate | 2002 |
| publisher | Penerbit UTM Press |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | utm-85452017-11-01T04:17:42Z http://eprints.utm.my/8545/ A binary access control scheme with high data security. Islam, Md. Rafiqul Md. Sap, Mohd. Noor QA75 Electronic computers. Computer science An access control scheme for implementing the access matrix is presented. The proposed scheme is based upon binary form of access rights. In this scheme each user is assigned one key. The keys are possessed by the users and can be used to derive the access rights to the files. In this scheme attention has been given to the access information (keys of the users) itself This scheme is more effective and efficient for the systems where files are accessible to only limited number of users. Penerbit UTM Press 2002-12 Article PeerReviewed application/pdf en http://eprints.utm.my/8545/1/MohdNoorMdSap2002_ABinaryAccessControlScemeWithHigh.PDF Islam, Md. Rafiqul and Md. Sap, Mohd. Noor (2002) A binary access control scheme with high data security. Jurnal Teknologi Maklumat, 14 (2). pp. 8-16. ISSN 0128-3790 |
| spellingShingle | QA75 Electronic computers. Computer science Islam, Md. Rafiqul Md. Sap, Mohd. Noor A binary access control scheme with high data security. |
| title | A binary access control scheme with high data security. |
| title_full | A binary access control scheme with high data security. |
| title_fullStr | A binary access control scheme with high data security. |
| title_full_unstemmed | A binary access control scheme with high data security. |
| title_short | A binary access control scheme with high data security. |
| title_sort | binary access control scheme with high data security. |
| topic | QA75 Electronic computers. Computer science |
| url | http://eprints.utm.my/8545/ http://eprints.utm.my/8545/1/MohdNoorMdSap2002_ABinaryAccessControlScemeWithHigh.PDF |