{"title":"Design of Secure CAMIN Application System Based on Dependable and Secure TMO and RT-UCON","authors":"Jungin Kim, B. Thuraisingham","doi":"10.1109/ISORC.2007.28","DOIUrl":null,"url":null,"abstract":"Increasingly the need for protecting information from unauthorized access has lead to more attention in the field of information security. Access control mechanisms have been in place for the last four decades and are a powerful tool utilized to ensure security. In a real-time distributed computing environment, systems have to meet timing constraints for time sensitive applications, such as obtaining financial quotes and operating command and control systems. However, real-time distributed computing environment security is yet to be investigated. Earlier work examined a Time Triggered Message Triggered Object (TMO) scheme that provides real-time services in a distributed computing environment secured by applying a Role-Based Access Control (RBAC). In this paper we describe the application of a sophisticated Usage Control (UCON) model for a TMO and subsequently design an application that utilizes a Coordinated Anti-Missile Interceptor Network (CAMIN) system. This application is a secure CAMIN based upon a secure TMO that applies a Real Time UCON (RT-UCON) in the CAMIN environment","PeriodicalId":265471,"journal":{"name":"10th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC'07)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"10th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC'07)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISORC.2007.28","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
Increasingly the need for protecting information from unauthorized access has lead to more attention in the field of information security. Access control mechanisms have been in place for the last four decades and are a powerful tool utilized to ensure security. In a real-time distributed computing environment, systems have to meet timing constraints for time sensitive applications, such as obtaining financial quotes and operating command and control systems. However, real-time distributed computing environment security is yet to be investigated. Earlier work examined a Time Triggered Message Triggered Object (TMO) scheme that provides real-time services in a distributed computing environment secured by applying a Role-Based Access Control (RBAC). In this paper we describe the application of a sophisticated Usage Control (UCON) model for a TMO and subsequently design an application that utilizes a Coordinated Anti-Missile Interceptor Network (CAMIN) system. This application is a secure CAMIN based upon a secure TMO that applies a Real Time UCON (RT-UCON) in the CAMIN environment