On the Suitability of Dissemination-centric Access Control Systems for Group-centric Sharing Full Proofs

نویسندگان

  • William C. Garrison
  • Yechen Qiao
  • Adam J. Lee
چکیده

1.1 g-SIS0 Model States States in g-SIS0 systems have the following fields. • S, the set of subjects • O, the set of objects • G, the set of groups • T , the set of times • >T , the total order on T • Time ∈ T , the current time • StrictJoin ⊆ S ×G× T , the record of strict join events • LiberalJoin ⊆ S ×G× T , the record of liberal join events • StrictLeave ⊆ S ×G× T , the record of strict leave events • LiberalLeave ⊆ S ×G× T , the record of liberal leave events • StrictAdd ⊆ O ×G× T , the record of strict add events • LiberalAdd ⊆ O ×G× T , the record of liberal add events • StrictRemove ⊆ O ×G× T , the record of strict remove events • LiberalRemove ⊆ O ×G× T , the record of liberal remove events

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Access control in ultra-large-scale systems using a data-centric middleware

  The primary characteristic of an Ultra-Large-Scale (ULS) system is ultra-large size on any related dimension. A ULS system is generally considered as a system-of-systems with heterogeneous nodes and autonomous domains. As the size of a system-of-systems grows, and interoperability demand between sub-systems is increased, achieving more scalable and dynamic access control system becomes an im...

متن کامل

Group-Centric Models for Secure and Agile Information Sharing

To share information and retain control (share-but-protect) is a classic cyber security problem for which effective solutions continue to be elusive. Where the patterns of sharing are well defined and slow to change it is reasonable to apply the traditional access control models of lattice-based, role-based and attribute-based access control, along with discretionary authorization for further f...

متن کامل

Evolutionary Computing Assisted Wireless Sensor Network Mining for QoS-Centric and Energy-efficient Routing Protocol

The exponential rise in wireless communication demands and allied applications have revitalized academia-industries to develop more efficient routing protocols. Wireless Sensor Network (WSN) being battery operated network, it often undergoes node death-causing pre-ma...

متن کامل

Research and Development of Net-Centric Information Sharing Platform

Compared with traditional distributed environment, the net-centric environment brings on more demanding challenges for information sharing with the characteristics of ultra-large scale and strong distribution, dynamic, autonomy, heterogeneity, redundancy. This paper realizes an information sharing model and a series of core services, through which provides an open, flexible and scalable informa...

متن کامل

Synergy: A Policy-Driven, Trust-Aware Information Dissemination Framework

Information dissemination is of vital importance in today’s information-centric world. However, controlling the flow of information across multiple security domains is a problem. Most of the current solutions rely on prior knowledge of the users for authorization, which does not scale well. Also, many information sources have dynamic access control policies, which are hard to satisfy under exis...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014