Threshold Access Control Scheme Based on Quantifying Permission
DOI:
Author:
Affiliation:

Clc Number:

Fund Project:

  • Article
  • |
  • Figures
  • |
  • Metrics
  • |
  • Reference
  • |
  • Related
  • |
  • Cited by
  • |
  • Materials
  • |
  • Comments
    Abstract:

    Secret protection is studied after introducing the quantifying permission idea in the view of access control. Meta-Permission is derived from the view of ‘uality’and‘uantity’in philosophy. Compared with traditional cognition and permission used in access control, it comprehensively and deeply reflects the essence of permission. Combining with the threshold idea and RBAC, a threshold access control scheme based on quantifying permission is proposed. This scheme is applicable as widely as secret-sharing scheme, and shares the same function in protecting secret. Furthermore, it has some distinct advantages such as no relation in knowledge between the secret pieces hold by participants and the protective secret target, the ability for expressing the difference among participants?trustworthiness, and the low complexity in computing.

    Reference
    Related
    Cited by
Get Citation

雷浩,冯登国,周永彬,黄建.基于量化权限的门限访问控制方案.软件学报,2004,15(11):1680-1688

Copy
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:June 09,2003
  • Revised:July 06,2004
  • Adopted:
  • Online:
  • Published:
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063