A binary access control scheme with high data security.
An access control scheme for implementing the access matrix is presented. The proposed scheme is based upon binary form of access rights. In this scheme each user is assigned one key. The keys are possessed by the users and can be used to derive the access rights to the files. In this scheme attenti...
| Main Authors: | Islam, Md. Rafiqul, Md. Sap, Mohd. Noor |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Penerbit UTM Press
2002
|
| Subjects: | |
| Online Access: | http://eprints.utm.my/8545/ http://eprints.utm.my/8545/1/MohdNoorMdSap2002_ABinaryAccessControlScemeWithHigh.PDF |
Similar Items
User access control and security model
by: Crysdian, Cahyo, et al.
Published: (2000)
by: Crysdian, Cahyo, et al.
Published: (2000)
A model for controlling access to XML documents.
by: Rahman, Kh. Azizur, et al.
Published: (2003)
by: Rahman, Kh. Azizur, et al.
Published: (2003)
Secure Cloud Storage with a Sanitizable Access Control System Again Malicious Data Publisher
by: Alfiya Khanum, R.M., et al.
Published: (2024)
by: Alfiya Khanum, R.M., et al.
Published: (2024)
A lossless parallel data compression method using threads
by: Islam, Md. Rafiqul, et al.
Published: (2005)
by: Islam, Md. Rafiqul, et al.
Published: (2005)
SDAW: secure data aggregation watermarking-based scheme in homogeneous WSNs
by: Boubiche, Djallel Eddine, et al.
Published: (2015)
by: Boubiche, Djallel Eddine, et al.
Published: (2015)
Secret sharing scheme for collaborative access system
by: Kadir, Rashidah, et al.
Published: (2000)
by: Kadir, Rashidah, et al.
Published: (2000)
Modelling kernel methods for unsupervised learning of micro array data
by: Md. Sap, Mohd. Noor
Published: (2008)
by: Md. Sap, Mohd. Noor
Published: (2008)
Data mining and e-commerce : methods, applications, and challenges
by: Rastegari, Hamid, et al.
Published: (2008)
by: Rastegari, Hamid, et al.
Published: (2008)
Predictive data mining based on similarity and clustering methods.
by: Defit, Sarjon, et al.
Published: (2000)
by: Defit, Sarjon, et al.
Published: (2000)
VAP Code: A Secure Graphical Password Scheme for Smart Devices
by: Azad, Saiful, et al.
Published: (2016)
by: Azad, Saiful, et al.
Published: (2016)
Pengelompokan data kajicuaca bagi peramalan taburan hujan
by: Dollah@Md. Zain, Rozilawati, et al.
Published: (2003)
by: Dollah@Md. Zain, Rozilawati, et al.
Published: (2003)
A Faster External Sorting Algorithm Using No Additional Disk Space
by: Islam, Md. Rafiqul, et al.
Published: (2006)
by: Islam, Md. Rafiqul, et al.
Published: (2006)
Outlier Detection Technique in Data Mining: A Research Perspective
by: Mansur, M. O., et al.
Published: (2005)
by: Mansur, M. O., et al.
Published: (2005)
Clustering Spatial Data Using a Kernel-Based Algorithm
by: Awan, A. Majid, et al.
Published: (2005)
by: Awan, A. Majid, et al.
Published: (2005)
Classification with degree of importance of attributes for stock market data mining
by: Khokhar, Rashid Hafeez, et al.
Published: (2004)
by: Khokhar, Rashid Hafeez, et al.
Published: (2004)
Finding spatio-temporal patterns in climate data using clustering
by: Md. Sap, Mohd. Noor, et al.
Published: (2005)
by: Md. Sap, Mohd. Noor, et al.
Published: (2005)
Anomaly network intrusion detection method in network security based on principle component analysis
by: Chimphlee, Witcha, et al.
Published: (2006)
by: Chimphlee, Witcha, et al.
Published: (2006)
Big data security
by: Al-Shawabkeh, Mahmoud M. M.
Published: (2014)
by: Al-Shawabkeh, Mahmoud M. M.
Published: (2014)
Clustering technique in data mining : general and research perspective.
by: Che Mat @ Mohd. Shukor, Zamzarina, et al.
Published: (2002)
by: Che Mat @ Mohd. Shukor, Zamzarina, et al.
Published: (2002)
Unsupervised Anomaly Detection with Unlabeled Data Using Clustering
by: Chimphlee, Witcha, et al.
Published: (2005)
by: Chimphlee, Witcha, et al.
Published: (2005)
Energy-efficient data security schemes for mobile users in cloud environment / Abdul Nasir Khan
by: Khan, Abdul Nasir
Published: (2014)
by: Khan, Abdul Nasir
Published: (2014)
Pengelompokan data kajicuaca menggunakan teknik peraturan kesatuan
by: Dollah @ Md. Zain, Rozilawati, et al.
Published: (2003)
by: Dollah @ Md. Zain, Rozilawati, et al.
Published: (2003)
Predictive fuzzy reasoning method for time series stock market data mining
by: Khokhar, Rashid Hafeez, et al.
Published: (2005)
by: Khokhar, Rashid Hafeez, et al.
Published: (2005)
Securing WSN with lightweight resource-efficient schemes
by: Pathan, Al-Sakib Khan
Published: (2011)
by: Pathan, Al-Sakib Khan
Published: (2011)
Data Mining : A Preview
by: Defit, Sarjon, et al.
Published: (2000)
by: Defit, Sarjon, et al.
Published: (2000)
TrustData: trustworthy and secured data collection for event detection in industrial cyber-physical system (In Press)
by: Rahman, Md. Arafatur, et al.
Published: (2020)
by: Rahman, Md. Arafatur, et al.
Published: (2020)
Pengelompokan Selari Untuk Data Skala Besar dan Dimensional Tinggi Pada Aplikasi Perlombongan Data
by: Afivi, Refcan, et al.
Published: (2005)
by: Afivi, Refcan, et al.
Published: (2005)
SECRET: a secure and efficient certificate revocation scheme for mobile ad hoc networks
by: Mall, Dieynaba, et al.
Published: (2014)
by: Mall, Dieynaba, et al.
Published: (2014)
A new auditing scheme for securing statistical databases
by: P.D.D., Dominic, et al.
Published: (2008)
by: P.D.D., Dominic, et al.
Published: (2008)
Blockchain-enabled Secure Privacy-preserving System for Public Health-center Data
by: Islam, Md. Shohidul, et al.
Published: (2023)
by: Islam, Md. Shohidul, et al.
Published: (2023)
Pengelompokan Data Kaji Cuaca Menggunakan Teknik Engelompokan Hierarki Agglomerative Bagi Peramalan Taburan Hujan
by: Bahari, Mahadi, et al.
Published: (2005)
by: Bahari, Mahadi, et al.
Published: (2005)
New statistical Binary Random Test
by: Taha, Imad, et al.
Published: (2006)
by: Taha, Imad, et al.
Published: (2006)
Adaptive Concurrent Medium Access Control for Wireless Mesh Network
by: Ibrahim, Mohd Sufiz, et al.
Published: (2010)
by: Ibrahim, Mohd Sufiz, et al.
Published: (2010)
Cybersecurity in Big Data Era: From Securing Big Data to Data-Driven Security
by: Manjunatha, V., et al.
Published: (2024)
by: Manjunatha, V., et al.
Published: (2024)
Binary context-free grammars
by: Turaev, Sherzod, et al.
Published: (2020)
by: Turaev, Sherzod, et al.
Published: (2020)
Comparison between transmission control protocol schemes on wireless environment
by: M. Albareki, Mustafa Ali
Published: (2008)
by: M. Albareki, Mustafa Ali
Published: (2008)
Study on Wireless Network and Restrictive Approaches to Enhance the Data Security
by: Ponkoodalingam, Kannan, et al.
Published: (2018)
by: Ponkoodalingam, Kannan, et al.
Published: (2018)
A framework for predicting oil-palm yield from climate data
by: Awan, A. Majid, et al.
Published: (2006)
by: Awan, A. Majid, et al.
Published: (2006)
Predicting next page access by Markov models and association rules on web log data
by: Chimphlee, S., et al.
Published: (2006)
by: Chimphlee, S., et al.
Published: (2006)
Hybrid self organizing map for overlapping clusters
by: Md. Sap, Mohd. Noor, et al.
Published: (2008)
by: Md. Sap, Mohd. Noor, et al.
Published: (2008)
Similar Items
-
User access control and security model
by: Crysdian, Cahyo, et al.
Published: (2000) -
A model for controlling access to XML documents.
by: Rahman, Kh. Azizur, et al.
Published: (2003) -
Secure Cloud Storage with a Sanitizable Access Control System Again Malicious Data Publisher
by: Alfiya Khanum, R.M., et al.
Published: (2024) -
A lossless parallel data compression method using threads
by: Islam, Md. Rafiqul, et al.
Published: (2005) -
SDAW: secure data aggregation watermarking-based scheme in homogeneous WSNs
by: Boubiche, Djallel Eddine, et al.
Published: (2015)