A hierarchical single-key-lock access control using the Chinese remainder theorem.
Kim S. LeeHuizhu LuD. D. FisherPublished in: SAC (1992)
Keyphrases
- access control
- chinese remainder theorem
- data security
- fine grained
- security policies
- dynamic access control
- security mechanisms
- access control policies
- role based access control
- access control models
- database security
- security model
- identity management
- access control mechanism
- protection schemes
- role based access control model
- relational databases
- data protection
- role assignment
- image reconstruction