Delegation Management Modeling in a Security Policy based Environment

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Delegation Management Modeling in a Security Policy based Environment

Security Policies (SP) constitute the core of communication networks protection infrastructures. It offers a set of rules allowing differentiating between legitimate actions and prohibited ones and consequently, associates each entity in the network with a set of permissions and privileges. Moreover, in today's technological society and to allow applications perpetuity, communication networks m...

متن کامل

Efficient Security Policy Enforcement in a Location Based Service Environment

Location based services, one of the promising markets of mobile commerce, aims at delivering point of need personalized information. Often, these services to be delivered are based on the prior knowledge of the profiles of mobile customers and security and privacy policies dictated by them. These policies may specify revealing the sensitive information of mobile customers (e.g., age, salary) se...

متن کامل

User Isolation and Policy-Based Security Management

Network security and identity management are top concerns for service providers. Detailed traffic monitoring and analysis are typically required to identify and isolate malicious users. Such process can take hours (if not days) especially during heavy traffic loads and substantial level of attacks. As a result, the network may crash even before the analysis is completed. Thus, it may be importa...

متن کامل

Role Based Trust Management Security Policy Analysis

We use symmetric keys to encrypt and decrypt attribute values. These keys are distributed only to the brokers that are trusted with the attribute values. The system will never deliver these keys to clients. This reduces the number of nodes that are trusted with sensitive keys, and that take part in key management protocols. This does not affect security since local brokers encrypt and decrypt a...

متن کامل

Domain Based Internet Security Policy Management

Abstract. As security devices and protocols become widely used on the Internet, the task of managing and processing communication security policies grows steeply in its complexity. This paper presents a scaleable, robust, secure distributed system that can manage communication security policies associated with multiple network domains and resolving the policies — esp. those that specify the use...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Electronic Proceedings in Theoretical Computer Science

سال: 2013

ISSN: 2075-2180

DOI: 10.4204/eptcs.122.8