CHAOS: An Active Security Mediation System
نویسندگان
چکیده
With the emergence of the Internet, collaborative computing has become more feasible than ever. Organizations can share valuable information among each other. However, certain users should only access certain portions of source data. The CHAOS (Configurable Heterogeneous Active Object System) project addresses security issues that arise when information is shared among collaborating enterprises. It provides a framework for integrating security policy specification with source data maintenance. In CHAOS, security policies are incorporated into the data objects as active nodes to form active objects. When active objects are queried, their active nodes are dynamically loaded by the active security mediator and executed. The active nodes, based on the security policy incorporated, can locate and operate on all the elements within the active object, modifying the content as well as the structure of the object. A set of API’s is provided to construct more complex security policies, which can be tailored for different enterprise settings. This model moves the responsibility of security to the source data provider, rather than through a central authority. The design provides enterprises with a flexible mechanism to protect sensitive information in a collaborative computing environment.
منابع مشابه
CHAOS: An Active Security Mediation System 1 CHAOS: An Active Security Mediation System
With the emergence of the Internet, collaborative computing has become more feasible than ever. Organizations can share valuable information among each other. However, certain users should only access certain portions of source data. The CHAOS (Configurable Heterogeneous Active Object System) project addresses security issues that arise when information is shared among collaborating enterprises...
متن کاملImproving security of double random phase encoding with chaos theory using fractal images
This study presents a new method based on the combination of cryptography and information hiding methods. Firstly, the image is encoded by the Double Random Phase Encoding (DRPE) technique. The real and imaginary parts of the encoded image are subsequently embedded into an enlarged normalized host image. DRPE demands two random phase mask keys to decode the decrypted image at the destination. T...
متن کاملA Novel Image Encryption Model Based on Hybridization of Genetic Algorithm, Chaos Theory and Lattice Map
Encryption is an important issue in information security which is usually provided using a reversible mathematical model. Digital image as a most frequently used digital product needs special encryption algorithms. This paper presents a new encryption algorithm high security for digital gray images using genetic algorithm and Lattice Map function. At the first the initial value of Logistic Map ...
متن کاملKato's chaos and P-chaos of a coupled lattice system given by Garcia Guirao and Lampart which is related with Belusov-Zhabotinskii reaction
In this article, we further consider the above system. In particular, we give a sufficient condition under which the above system is Kato chaotic for $eta=0$ and a necessary condition for the above system to be Kato chaotic for $eta=0$. Moreover, it is deduced that for $eta=0$, if $Theta$ is P-chaotic then so is this system, where a continuous map $Theta$ from a compact metric space $Z$ to itse...
متن کاملAN EFFICIENT CHARGED SYSTEM SEARCH USING CHAOS
The Charged System Search (CSS) is combined to chaos to solve mathematical global optimization problems. The CSS is a recently developed meta-heuristic optimization technique inspired by the governing laws of physics and mechanics. The present study introduces chaos into the CSS in order to increase its global search mobility for a better global optimization. Nine chaos-based CSS (CCSS) methods...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2000