Some Experiences with Secure Management
نویسندگان
چکیده
This paper describes work carried out in the ESPRIT MIDAS project to provide secure management facilities. The work is based on extensions to the OSI CMIP management protocol which provide for mutual authentication at association set-up and integrity checks in all PDUs. The first version of this mechanism has been implemented and tested; in practice it has been found to be rather slow in operation. This paper proposes a series of measures designed to streamline operation and so improve performance. A major goal of the work has been to provide secure access to management information. This implies the existence of a flexible, yet implementable, access control model. The limitations of the existing standards in this area are discussed.
منابع مشابه
The Prediction of Adult Attachment Styles through Childhood Abuse Experiences
One of the most critical environmental factors in the formation of attachment is childhood experiences, especially childhood abuse experiences. This study aimed to investigate the role of childhood abuse experiences on attachment dimensions among adulthood. This study was a descriptive-analytical from correlation type. The statistical population included all university students in the Islamic A...
متن کاملSoftware for Interactive Secure Systems Design: Lessons Learned Developing and Applying CAIRIS
As systems become more complex, the potential for security vulnerabilities being introduced increases. If we are to provide assurances about systems we design then we need the means of analysing, managing, and generally making sense of the data that contributes to the design. Unfortunately, despite ongoing research into tools for supporting secure software development, there are few examples of...
متن کاملResearching into experiences of different countries in Economic Resilience; Some implications to achieve an operational model of Resilience in Iranian Economy
Researching into experiences of different countries shows that these countries adopt actions and policies according to their special conditions that can be interpret as a form of resistance the economic system. This paper used a library study method for experiences and actions of different countries and finally suggested some key ideas to achieve an operational model of Resilience in Iranian Ec...
متن کاملManaging Information Security in Large Defence Procurements: the Royal Air Force Lits Experience
This paper describes the practical experiences of the authors subsequent to the 1993 Symposium and overlays the procurement process that took place for the development of the first tranche of the Royal Air Force’s Logistics Information Technology System from a COMPUSEC perspective. It explains some of the problems encountered by the Security Team during the selection of a Prime Systems Integrat...
متن کاملProvably secure and efficient identity-based key agreement protocol for independent PKGs using ECC
Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...
متن کامل