INFORMATION SYSTEM SECURITY CONTROL MODEL

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Bond System Security and Access Control Model

Bond is a message-oriented middleware for network computing on a grid of autonomous nodes. In this paper we overview the basic architecture of the Bond system and introduce the security model implemented in the Bond system. User programs as well as data are subject to the security constraints imposed by the local operating system. Bond objects are subject to the access control and the authentic...

متن کامل

Advanced Approach to Information Security Management System Model for Industrial Control System

Organizations make use of important information in day-to-day business. Protecting sensitive information is imperative and must be managed. Companies in many parts of the world protect sensitive information using the international standard known as the information security management system (ISMS). ISO 27000 series is the international standard ISMS used to protect confidentiality, integrity, a...

متن کامل

Information System Security Goals

A large part of information systems security approaches is technical in nature with less consideration on people and organizational issues. To this end, there is a need to investigate other means of managing information systems security since most information systems security approaches although valuable they focus on technical oriented solutions, e.g. checklists, risk analysis, evaluation meth...

متن کامل

A Mandatory Access Control Policy Model for Information Security Requirements

Two basic paradigms towards speciication of information security requirements can be taken: continuous speciication and early speciication of requirements. In models supporting continuous specii-cation and reenement of information security requirements, the development organization is more vulnerable to the tampering with partially speciied requirement primitives. This paper proposes a formal m...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Современные наукоемкие технологии (Modern High Technologies)

سال: 2020

ISSN: 1812-7320

DOI: 10.17513/snt.38067