Enhancing Cim Environments by Security Control

نویسندگان

  • S. Vieweg
  • C. Huemer
  • G. Pernul
  • W. Winiwarter
چکیده

Computer Integrated Manufacturing (CIM) applications require a different database functionality than applications in more traditional areas. Due to the growing importance of CIM, advanced database systems and data models have been developed to meet the CIM specific requirements. However, none of these approaches considers to include the security control in CIM databases. In this paper we identify the database support necessary for a complex CIM application and discuss the discretionary access control, the mandatory access control, the object-oriented security, and the Clark and Wilson model as potential candidates for the underlying security paradigm of CIM databases.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security Analyses for Enterprise Instant Messaging (EIM) Systems

onsumer instant messaging (CIM) services (aka public IM) such as AOL Messenger, Yahoo! Messenger, and MSN Messenger have achieved critical mass appeal and usage as a convenient and informal method of communication supporting real-time messaging and presence awareness.1,2 Unfortunately, these services are highly vulnerable from a security standpoint. Some of these security problems include threa...

متن کامل

Access Control for Security and Privacy in Ubiquitous Computing Environments

Ubiquitous computing (ubicomp) demands new security and privacy enhancing technologies for the new information and communication environments where a huge number of computers interact with each other in a distributed and ad hoc manner to access various resources and services. This paper surveys emerging security and privacy enhancing technologies, focusing on access control in ubiquitous comput...

متن کامل

CAMAC: a context-aware mandatory access control model

Mandatory access control models have traditionally been employed as a robust security mechanism in multilevel security environments such as military domains. In traditional mandatory models, the security classes associated with entities are context-insensitive. However, context-sensitivity of security classes and flexibility of access control mechanisms may be required especially in pervasive c...

متن کامل

Building a Topology Estimator for Large Inter-Regional Networks

The Common Information Model (CIM) [1] defines a utility industry standard object-model for the development and integration of applications used for electric power systems engineering, planning, management, operation and commerce. This paper describes the scope and technical basis for a project to develop a real-time Common Information Model (CIM) for the entire Eastern Interconnection. The pro...

متن کامل

Efficient Security and Privacy Enhancing Solutions in Untrusted Environments

Efficient Security and Privacy Enhancing Solutions in Untrusted Environments

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007