{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:09:16Z","timestamp":1773655756527,"version":"3.50.1"},"reference-count":0,"publisher":"IOS Press","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"abstract":"<jats:p>This paper analyzes the shortcomings of two commonly used secure chip file access methods and proposes a new secure chip file access method based on security level information. The method sets the security level information in the key file; sets the access operation permission information in the application file; obtains the security level information, determines the security status information of the directory file corresponding to the key file according to the security level information; and obtains the access operation permission. The information determines the file access authority according to the access operation authority information and the security state information. This method effectively reduces the complexity of the security mechanism within the secure chip, increases the convenience of file access, and overall and comprehensively guarantees the security of file access.<\/jats:p>","DOI":"10.3233\/978-1-61499-927-0-749","type":"book-chapter","created":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T10:27:05Z","timestamp":1740133625000},"source":"Crossref","is-referenced-by-count":1,"title":["A New Secure Chip File Access Method Based on Security Level Information"],"prefix":"10.3233","author":[{"family":"Fu Qingqin","sequence":"additional","affiliation":[]},{"family":"Ang Zhengquan","sequence":"additional","affiliation":[]},{"family":"Liu Jia","sequence":"additional","affiliation":[]},{"family":"Yuan Yanfang","sequence":"additional","affiliation":[]},{"family":"Yuan Jiahui","sequence":"additional","affiliation":[]}],"member":"7437","container-title":["Frontiers in Artificial Intelligence and Applications","Fuzzy Systems and Data Mining IV"],"original-title":[],"deposited":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T10:30:46Z","timestamp":1740133846000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.medra.org\/servlet\/aliasResolver?alias=iospressISBN&isbn=978-1-61499-926-3&spage=749&doi=10.3233\/978-1-61499-927-0-749"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"references-count":0,"URL":"https:\/\/doi.org\/10.3233\/978-1-61499-927-0-749","relation":{},"ISSN":["0922-6389"],"issn-type":[{"value":"0922-6389","type":"print"}],"subject":[],"published":{"date-parts":[[2018]]}}}