Multilevel Security Model using Distributed Keys in MANET
نویسندگان
چکیده
منابع مشابه
Multilevel Security Model using Distributed Keys in MANET
In military areas where MANET is used, enemy can physically capture soldier mobile device and can use stored private key to sign unauthorized messages. To overcome this security issue Shamir‟s (t, n) threshold secret sharing scheme is used to protect stored private key. Using this scheme the user private key is decomposed into „n‟ parts and distributed to „n‟ nodes in network. So when user want...
متن کاملEnhanced Authentication Mechanism Using Multilevel Security Model
This paper presents a proposed multilevel authentication method which is implemented especially in sensitive applications where they contain multilevel secure and confidential data. The proposed method divides the system into multiple sensitive levels and tests users against different authentication methods for each level. Most levels are subdivided further into secure sublevels. Each sublevel ...
متن کاملA multilevel security model for a distributed object-oriented system
multilevel security, information flow, object model It often suggested that distributed computing will be the major trend in computer systems during the next decade. However, distributed systems are vulnerable to a number of security attacks. In this paper we look at the security problems of object-based distributed systems, and propose a model based on labeling for multilevel security. The pur...
متن کاملMultilevel Policy Based Security in Distributed Database
Addressing security demands under fixed budgets and deadline constraints are becoming extremely challenging, time consuming and resource intensive. Moreover, securing the distributed database in compliance with several security guidelines makes the system more complex. Mission critical systems, military, government and financial institutions have been under tremendous pressure to secure their d...
متن کاملMultilevel security issues in distributed database management systems
T he advent of computers earlier this century has led us not only to rely increasingly on the information stored in them but also to trust their output. This alliance with the computer has resulted in the automation of basic operations and management support functions. This was done through the manipulation of computerized information maintained in a database. Although the creation and manipula...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2013
ISSN: 0975-8887
DOI: 10.5120/12213-8340