A binary access control scheme with high data security.

An access control scheme for implementing the access matrix is presented. The proposed scheme is based upon binary form of access rights. In this scheme each user is assigned one key. The keys are possessed by the users and can be used to derive the access rights to the files. In this scheme attenti...

Full description

Bibliographic Details
Main Authors: Islam, Md. Rafiqul, Md. Sap, Mohd. Noor
Format: Article
Language:English
Published: Penerbit UTM Press 2002
Subjects:
Online Access:http://eprints.utm.my/8545/
http://eprints.utm.my/8545/1/MohdNoorMdSap2002_ABinaryAccessControlScemeWithHigh.PDF
_version_ 1848891711666782208
author Islam, Md. Rafiqul
Md. Sap, Mohd. Noor
author_facet Islam, Md. Rafiqul
Md. Sap, Mohd. Noor
author_sort Islam, Md. Rafiqul
building UTeM Institutional Repository
collection Online Access
description An access control scheme for implementing the access matrix is presented. The proposed scheme is based upon binary form of access rights. In this scheme each user is assigned one key. The keys are possessed by the users and can be used to derive the access rights to the files. In this scheme attention has been given to the access information (keys of the users) itself This scheme is more effective and efficient for the systems where files are accessible to only limited number of users.
first_indexed 2025-11-15T21:02:19Z
format Article
id utm-8545
institution Universiti Teknologi Malaysia
institution_category Local University
language English
last_indexed 2025-11-15T21:02:19Z
publishDate 2002
publisher Penerbit UTM Press
recordtype eprints
repository_type Digital Repository
spelling utm-85452017-11-01T04:17:42Z http://eprints.utm.my/8545/ A binary access control scheme with high data security. Islam, Md. Rafiqul Md. Sap, Mohd. Noor QA75 Electronic computers. Computer science An access control scheme for implementing the access matrix is presented. The proposed scheme is based upon binary form of access rights. In this scheme each user is assigned one key. The keys are possessed by the users and can be used to derive the access rights to the files. In this scheme attention has been given to the access information (keys of the users) itself This scheme is more effective and efficient for the systems where files are accessible to only limited number of users. Penerbit UTM Press 2002-12 Article PeerReviewed application/pdf en http://eprints.utm.my/8545/1/MohdNoorMdSap2002_ABinaryAccessControlScemeWithHigh.PDF Islam, Md. Rafiqul and Md. Sap, Mohd. Noor (2002) A binary access control scheme with high data security. Jurnal Teknologi Maklumat, 14 (2). pp. 8-16. ISSN 0128-3790
spellingShingle QA75 Electronic computers. Computer science
Islam, Md. Rafiqul
Md. Sap, Mohd. Noor
A binary access control scheme with high data security.
title A binary access control scheme with high data security.
title_full A binary access control scheme with high data security.
title_fullStr A binary access control scheme with high data security.
title_full_unstemmed A binary access control scheme with high data security.
title_short A binary access control scheme with high data security.
title_sort binary access control scheme with high data security.
topic QA75 Electronic computers. Computer science
url http://eprints.utm.my/8545/
http://eprints.utm.my/8545/1/MohdNoorMdSap2002_ABinaryAccessControlScemeWithHigh.PDF