Processing Logical Access Control Command in Computer System

نویسندگان

  • Tsang-Yean Lee
  • Huey-Ming Lee
  • Wuu-Yee Chen
  • Heng-Sheng Chen
چکیده

Access control includes physical and logical access control. Physical access control protects the damage, theft and losing of assess. In this paper, we propose the method to protect logical access control. If we want to control the access information system in security, we can encrypt the executing command to cipher text and send it to the computer system. The computer system decrypts the cipher text to the original executing command. The computer system also checks executing command of availability to process.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

STARBAC: Spatio temporal Role Based Access C ontrol

Role Based Access Control (RBAC) has emerged as an important access control paradigm in computer security. However, the access decisions that can be taken in a system implementing RBAC do not include many relevant factors like user location, system location, system time, etc. We propose a spatiotemporal RBACModel (STARBAC)which reasons in spatial and temporal domain in tandem. STARBAC control c...

متن کامل

Enforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version)

One of the security issues in data outsourcing is the enforcement of the data owner’s access control policies. This includes some challenges. The first challenge is preserving confidentiality of data and policies. One of the existing solutions is encrypting data before outsourcing which brings new challenges; namely, the number of keys required to access authorized resources, efficient policy u...

متن کامل

Hierarchical Structure for Data Management

on a hierarchical organization of the data management control function and makes use of list processing concepts. Discussed are the separation of the logical and physical control functions as well as the data-element and operating-system controls. This hierarchical approach establishes a common basis for the creation, maintenance, and retrieval of data in direct-access storage. Logical function...

متن کامل

Improved Turbine Engine Hierarchical Modeling and Simulation Based on Engine Fuel Control System

Aircraft engines constitute a comp‌lex system, requiring adequate mon-itoring to ensure flight safety and timely maintenance. The best way to achieve this, is modeling the engine. Therefore, in this paper, a suitable mathematical model from engine controller design point of view, for a specific aero turbine engine is proposed by the aid of MATLAB/Simulink software. The model is capable of reduc...

متن کامل

Active cyber defense with denial and deception: A cyber-wargame experiment

In January 2012, MITRE performed a real-time, red team/blue team cyber-wargame experiment. This presented the opportunity to blend cyber-warfare with traditional mission planning and execution, including denial and deception tradecraft. The cyberwargame was designed to test a dynamic network defense cyber-security platform being researched in The MITRE Corporation’s Innovation Program called Bl...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • JDCTA

دوره 2  شماره 

صفحات  -

تاریخ انتشار 2008