Processing Logical Access Control Command in Computer System
نویسندگان
چکیده
Access control includes physical and logical access control. Physical access control protects the damage, theft and losing of assess. In this paper, we propose the method to protect logical access control. If we want to control the access information system in security, we can encrypt the executing command to cipher text and send it to the computer system. The computer system decrypts the cipher text to the original executing command. The computer system also checks executing command of availability to process.
منابع مشابه
STARBAC: Spatio temporal Role Based Access C ontrol
Role Based Access Control (RBAC) has emerged as an important access control paradigm in computer security. However, the access decisions that can be taken in a system implementing RBAC do not include many relevant factors like user location, system location, system time, etc. We propose a spatiotemporal RBACModel (STARBAC)which reasons in spatial and temporal domain in tandem. STARBAC control c...
متن کاملEnforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version)
One of the security issues in data outsourcing is the enforcement of the data owner’s access control policies. This includes some challenges. The first challenge is preserving confidentiality of data and policies. One of the existing solutions is encrypting data before outsourcing which brings new challenges; namely, the number of keys required to access authorized resources, efficient policy u...
متن کاملHierarchical Structure for Data Management
on a hierarchical organization of the data management control function and makes use of list processing concepts. Discussed are the separation of the logical and physical control functions as well as the data-element and operating-system controls. This hierarchical approach establishes a common basis for the creation, maintenance, and retrieval of data in direct-access storage. Logical function...
متن کاملImproved Turbine Engine Hierarchical Modeling and Simulation Based on Engine Fuel Control System
Aircraft engines constitute a complex system, requiring adequate mon-itoring to ensure flight safety and timely maintenance. The best way to achieve this, is modeling the engine. Therefore, in this paper, a suitable mathematical model from engine controller design point of view, for a specific aero turbine engine is proposed by the aid of MATLAB/Simulink software. The model is capable of reduc...
متن کاملActive cyber defense with denial and deception: A cyber-wargame experiment
In January 2012, MITRE performed a real-time, red team/blue team cyber-wargame experiment. This presented the opportunity to blend cyber-warfare with traditional mission planning and execution, including denial and deception tradecraft. The cyberwargame was designed to test a dynamic network defense cyber-security platform being researched in The MITRE Corporation’s Innovation Program called Bl...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- JDCTA
دوره 2 شماره
صفحات -
تاریخ انتشار 2008