Enhancing Cim Environments by Security Control
نویسندگان
چکیده
Computer Integrated Manufacturing (CIM) applications require a different database functionality than applications in more traditional areas. Due to the growing importance of CIM, advanced database systems and data models have been developed to meet the CIM specific requirements. However, none of these approaches considers to include the security control in CIM databases. In this paper we identify the database support necessary for a complex CIM application and discuss the discretionary access control, the mandatory access control, the object-oriented security, and the Clark and Wilson model as potential candidates for the underlying security paradigm of CIM databases.
منابع مشابه
Security Analyses for Enterprise Instant Messaging (EIM) Systems
onsumer instant messaging (CIM) services (aka public IM) such as AOL Messenger, Yahoo! Messenger, and MSN Messenger have achieved critical mass appeal and usage as a convenient and informal method of communication supporting real-time messaging and presence awareness.1,2 Unfortunately, these services are highly vulnerable from a security standpoint. Some of these security problems include threa...
متن کاملAccess Control for Security and Privacy in Ubiquitous Computing Environments
Ubiquitous computing (ubicomp) demands new security and privacy enhancing technologies for the new information and communication environments where a huge number of computers interact with each other in a distributed and ad hoc manner to access various resources and services. This paper surveys emerging security and privacy enhancing technologies, focusing on access control in ubiquitous comput...
متن کاملCAMAC: a context-aware mandatory access control model
Mandatory access control models have traditionally been employed as a robust security mechanism in multilevel security environments such as military domains. In traditional mandatory models, the security classes associated with entities are context-insensitive. However, context-sensitivity of security classes and flexibility of access control mechanisms may be required especially in pervasive c...
متن کاملBuilding a Topology Estimator for Large Inter-Regional Networks
The Common Information Model (CIM) [1] defines a utility industry standard object-model for the development and integration of applications used for electric power systems engineering, planning, management, operation and commerce. This paper describes the scope and technical basis for a project to develop a real-time Common Information Model (CIM) for the entire Eastern Interconnection. The pro...
متن کاملEfficient Security and Privacy Enhancing Solutions in Untrusted Environments
Efficient Security and Privacy Enhancing Solutions in Untrusted Environments
متن کامل