Ensuring Security in It Infrastructures
نویسنده
چکیده
This paper reviews some of the difficulties that arise in the secureoperating system design. Then a formal framework different fromand more powerful than the existing ones in the literature has beenproposed aiming at supporting multiple security policies in moderncomputing environments. Finally, three novel models in thedifferent areas, namely the confidentiality policy modelDMLR_MLS, the integrity policy model DTE_IPM, and theextended role-based access control model PCM_RBPC forcontrolling process privileges have been introduced, all of whichhave a number of desirable new features.
منابع مشابه
Villagization as a Policy Option to Rural Food Security: Facts from Villages in Assosa Zone, Benishangul-Gumuz Region, Ethiopia
Background: Villagization scheme was chosen as a policy option and implemented to ensure sustainable food security in Assosa zone, Benishangul-Gumuz region, Ethiopia, although it is blamed for intensifying food insecurity instead. Therefore, the present study aimed to examine the food security status of households gathered in planned villages in the framework of villagization. Methods: This cro...
متن کاملExploring the infrastructures for establishment of electronic municipality (e-municipality) in metropolis city of Tabriz
The purpose of this study is to explore infrastructures for establishment of electronic municipality in metropolis city of Tabriz. Thisis a descriptive survey and it is an applied one in terms of goal .Total sample consisted of total number of 120 employees in Statistics and Information Technology Department of municipality as well as those working in related sections to information technolog...
متن کاملArchitectural Model for Information Security Analysis of Critical Information Infrastructures
Critical Information Infrastructures (CII) are computer systems and networks that support and control operations of many critical infrastructures that our society depends on, such as power plants, electrical grids, and water and waste facilities. Since the operations of CII also effect physical world, they are a good example of large-scale, critical cyber-physical systems. In recent years, CII ...
متن کاملEnsuring Dependability in Service Oriented Computing
Next generation of energy systems, being dependant on Renewable Energy Resources (RES) and Distributed Generation (DG), will typically be based on flexible virtual cells of cells of balanced power consumption – generation rather than present day vertical hierarchical grid systems. Furthermore, new requirements on the supporting information infrastructure will pose new dependability challenges t...
متن کاملSecuring the Media Stream Inside VoIP SIP Based Sessions
One of the main issues encountered in the development of VoIP applications and infrastructures relates with ensuring the security of the communication channel between peers. The discussion on this subject can be split in two principal directions: the signaling path security and the media path security. In this document we focus on the latter by overviewing the current most important available m...
متن کاملAn ontology-based policy for deploying secure SIP-based VoIP services
— Voice services over Internet Protocol (VoIP) are nowadays much promoted by telecommunication and Internet service providers. However, the utilization of open networks, like the Internet, raises several security issues that must be accounted for. On top of that, there are new sophisticated attacks against VoIP infrastructures that capitalize on vulnerabilities of the protocols employed for the...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005