On the Suitability of Dissemination-centric Access Control Systems for Group-centric Sharing Full Proofs
نویسندگان
چکیده
1.1 g-SIS0 Model States States in g-SIS0 systems have the following fields. • S, the set of subjects • O, the set of objects • G, the set of groups • T , the set of times • >T , the total order on T • Time ∈ T , the current time • StrictJoin ⊆ S ×G× T , the record of strict join events • LiberalJoin ⊆ S ×G× T , the record of liberal join events • StrictLeave ⊆ S ×G× T , the record of strict leave events • LiberalLeave ⊆ S ×G× T , the record of liberal leave events • StrictAdd ⊆ O ×G× T , the record of strict add events • LiberalAdd ⊆ O ×G× T , the record of liberal add events • StrictRemove ⊆ O ×G× T , the record of strict remove events • LiberalRemove ⊆ O ×G× T , the record of liberal remove events
منابع مشابه
Access control in ultra-large-scale systems using a data-centric middleware
The primary characteristic of an Ultra-Large-Scale (ULS) system is ultra-large size on any related dimension. A ULS system is generally considered as a system-of-systems with heterogeneous nodes and autonomous domains. As the size of a system-of-systems grows, and interoperability demand between sub-systems is increased, achieving more scalable and dynamic access control system becomes an im...
متن کاملGroup-Centric Models for Secure and Agile Information Sharing
To share information and retain control (share-but-protect) is a classic cyber security problem for which effective solutions continue to be elusive. Where the patterns of sharing are well defined and slow to change it is reasonable to apply the traditional access control models of lattice-based, role-based and attribute-based access control, along with discretionary authorization for further f...
متن کاملEvolutionary Computing Assisted Wireless Sensor Network Mining for QoS-Centric and Energy-efficient Routing Protocol
The exponential rise in wireless communication demands and allied applications have revitalized academia-industries to develop more efficient routing protocols. Wireless Sensor Network (WSN) being battery operated network, it often undergoes node death-causing pre-ma...
متن کاملResearch and Development of Net-Centric Information Sharing Platform
Compared with traditional distributed environment, the net-centric environment brings on more demanding challenges for information sharing with the characteristics of ultra-large scale and strong distribution, dynamic, autonomy, heterogeneity, redundancy. This paper realizes an information sharing model and a series of core services, through which provides an open, flexible and scalable informa...
متن کاملSynergy: A Policy-Driven, Trust-Aware Information Dissemination Framework
Information dissemination is of vital importance in today’s information-centric world. However, controlling the flow of information across multiple security domains is a problem. Most of the current solutions rely on prior knowledge of the users for authorization, which does not scale well. Also, many information sources have dynamic access control policies, which are hard to satisfy under exis...
متن کامل