Ensuring Security in It Infrastructures

نویسنده

  • Mahmoud T. El-Hadidi
چکیده

This paper reviews some of the difficulties that arise in the secureoperating system design. Then a formal framework different fromand more powerful than the existing ones in the literature has beenproposed aiming at supporting multiple security policies in moderncomputing environments. Finally, three novel models in thedifferent areas, namely the confidentiality policy modelDMLR_MLS, the integrity policy model DTE_IPM, and theextended role-based access control model PCM_RBPC forcontrolling process privileges have been introduced, all of whichhave a number of desirable new features.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Villagization as a Policy Option to Rural Food Security: Facts from Villages in Assosa Zone, Benishangul-Gumuz Region, Ethiopia

Background: Villagization scheme was chosen as a policy option and implemented to ensure sustainable food security in Assosa zone, Benishangul-Gumuz region, Ethiopia, although it is blamed for intensifying food insecurity instead. Therefore, the present study aimed to examine the food security status of households gathered in planned villages in the framework of villagization. Methods: This cro...

متن کامل

Exploring the infrastructures for establishment of electronic municipality (e-municipality) in metropolis city of Tabriz

The purpose of this study is to explore infrastructures for establishment of electronic municipality in metropolis city of Tabriz. Thisis a descriptive survey and it is an applied one in terms of goal .Total sample consisted of total number of 120 employees in Statistics and Information Technology Department of municipality as well as those working in related sections to information technolog...

متن کامل

Architectural Model for Information Security Analysis of Critical Information Infrastructures

Critical Information Infrastructures (CII) are computer systems and networks that support and control operations of many critical infrastructures that our society depends on, such as power plants, electrical grids, and water and waste facilities. Since the operations of CII also effect physical world, they are a good example of large-scale, critical cyber-physical systems. In recent years, CII ...

متن کامل

Ensuring Dependability in Service Oriented Computing

Next generation of energy systems, being dependant on Renewable Energy Resources (RES) and Distributed Generation (DG), will typically be based on flexible virtual cells of cells of balanced power consumption – generation rather than present day vertical hierarchical grid systems. Furthermore, new requirements on the supporting information infrastructure will pose new dependability challenges t...

متن کامل

Securing the Media Stream Inside VoIP SIP Based Sessions

One of the main issues encountered in the development of VoIP applications and infrastructures relates with ensuring the security of the communication channel between peers. The discussion on this subject can be split in two principal directions: the signaling path security and the media path security. In this document we focus on the latter by overviewing the current most important available m...

متن کامل

An ontology-based policy for deploying secure SIP-based VoIP services

— Voice services over Internet Protocol (VoIP) are nowadays much promoted by telecommunication and Internet service providers. However, the utilization of open networks, like the Internet, raises several security issues that must be accounted for. On top of that, there are new sophisticated attacks against VoIP infrastructures that capitalize on vulnerabilities of the protocols employed for the...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005