This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
A Binary Single-Key-Lock System for Access Control
October 1989 (vol. 38 no. 10)
pp. 1462-1466
A binary coding method was invented and has been applied to the single-key-lock (SKL) system which achieves access control by associating with each accesser only one key and with each resource only one lock. The new system is called the binary single-key-lock (BSKL) system. In both the SKL and BSKL systems, through operations on the single-key-lock pair, the control information can be revealed.

[1] C. J. Date,An Introduction to Database Systems. Reading, MA: Addison-Wesley, 1981.
[2] J. H. Morriset al., "Andrew: a distributed personal computing environment,"Commun. ACM, vol. 29, no. 3, Mar. 1986.
[3] S. S. Yau, C. K. Chang, and R. A. Nicholl, "An approach to incremental program modification," inProc. COMPSAC 83, Nov. 1983, pp. 588-595.
[4] S. Christodoulakis and C. Faloutsos, "Design considerations for a message file server,"IEEE Trans. Software Eng., vol. SE-10, no. 2, pp. 201-1210, Mar. 1984.
[5] S. W. Miller and M. W. Collins, "Toward a reference model of mass storage systems,"IEEE Comput. Mag., vol. 18, no. 7, pp. 9-22, July 1985.
[6] L. Svobodova, "File servers for network-based distributed systems,"ACM Computing Surveys, vol. 16, no. 4, 1984.
[7] J. Dion, "The Cambridge file server,"OSR, vol. 14, no. 4, pp. 26-35, 1980.
[8] M. Fridrich and W. Older, "The FELIX file server," inProc. Eighth ACM Symp. Oper. Syst. Principles, Dec. 1981, pp. 37-44.
[9] J. G. Mitchell and J. Dion, "A comparison of two network-based file servers,"Commun. ACM, vol. 25, pp. 233-245, Apr. 1982.
[10] M. R. Brown, K. N. Kolling, and E. A. Taft, "The Alpine file system,"ACM TOCS, vol. 3, no. 4, pp. 261-293, Nov. 1985.
[11] K. Ekanadham and A. J. Bernstein, "Conditional capabilities,"IEEE Trans. Software Eng., vol. SE-5, no. 9, pp. 458-464, Sept. 1979.
[12] B. Lampsonet al., Distributed System--Architecture and Implementation. New York: Springer-Verlag, 1981, pp. 235-245.
[13] M. Wu and T. Hwang, "Access control with single-key-lock,"IEEE Trans. Software Eng., vol. SE-10, no. 2, pp. 185-191, Mar. 1984.
[14] G. S. Graham, "Protection--Principles and practice," inProc. AFIPS 1972 SJCC, vol. 40, 1972, pp. 417-429.
[15] J. L. Peterson and A. Silberschatz,Operating System Concepts. Reading, MA: Addison-Wesley, 1985.
[16] M. Schroeder and J.H. Saltzera, "A Hardware Architecture for Implementing Protection Rings,"Comm. of the ACM, Mar. 1972, pp. 157-170.
[17] J.H. Saltzer, "The Protection and Control of Information Sharing in Multics,"Comm. ACM, July 1974, pp. 308-402.

Index Terms:
single-key-lock system; access control; binary coding method; binary single-key-lock; BSKL; concurrency control; encoding.
Citation:
C.K. Chang, T.M. Jiang, "A Binary Single-Key-Lock System for Access Control," IEEE Transactions on Computers, vol. 38, no. 10, pp. 1462-1466, Oct. 1989, doi:10.1109/12.35842
Usage of this product signifies your acceptance of the Terms of Use.