Design of Secure CAMIN Application System Based on Dependable and Secure TMO and RT-UCON

Jungin Kim, B. Thuraisingham
{"title":"Design of Secure CAMIN Application System Based on Dependable and Secure TMO and RT-UCON","authors":"Jungin Kim, B. Thuraisingham","doi":"10.1109/ISORC.2007.28","DOIUrl":null,"url":null,"abstract":"Increasingly the need for protecting information from unauthorized access has lead to more attention in the field of information security. Access control mechanisms have been in place for the last four decades and are a powerful tool utilized to ensure security. In a real-time distributed computing environment, systems have to meet timing constraints for time sensitive applications, such as obtaining financial quotes and operating command and control systems. However, real-time distributed computing environment security is yet to be investigated. Earlier work examined a Time Triggered Message Triggered Object (TMO) scheme that provides real-time services in a distributed computing environment secured by applying a Role-Based Access Control (RBAC). In this paper we describe the application of a sophisticated Usage Control (UCON) model for a TMO and subsequently design an application that utilizes a Coordinated Anti-Missile Interceptor Network (CAMIN) system. This application is a secure CAMIN based upon a secure TMO that applies a Real Time UCON (RT-UCON) in the CAMIN environment","PeriodicalId":265471,"journal":{"name":"10th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC'07)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"10th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC'07)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISORC.2007.28","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

Increasingly the need for protecting information from unauthorized access has lead to more attention in the field of information security. Access control mechanisms have been in place for the last four decades and are a powerful tool utilized to ensure security. In a real-time distributed computing environment, systems have to meet timing constraints for time sensitive applications, such as obtaining financial quotes and operating command and control systems. However, real-time distributed computing environment security is yet to be investigated. Earlier work examined a Time Triggered Message Triggered Object (TMO) scheme that provides real-time services in a distributed computing environment secured by applying a Role-Based Access Control (RBAC). In this paper we describe the application of a sophisticated Usage Control (UCON) model for a TMO and subsequently design an application that utilizes a Coordinated Anti-Missile Interceptor Network (CAMIN) system. This application is a secure CAMIN based upon a secure TMO that applies a Real Time UCON (RT-UCON) in the CAMIN environment
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于可靠安全TMO和RT-UCON的安全CAMIN应用系统设计
保护信息不受非法访问的需求日益引起信息安全领域的关注。访问控制机制已经存在了四十年,是用于确保安全性的强大工具。在实时分布式计算环境中,系统必须满足时间敏感应用的时间限制,例如获取金融报价和操作命令和控制系统。然而,实时分布式计算环境的安全性还有待研究。早期的工作研究了时间触发消息触发对象(TMO)方案,该方案通过应用基于角色的访问控制(RBAC)在分布式计算环境中提供实时服务。在本文中,我们描述了一个复杂的使用控制(UCON)模型在TMO中的应用,并随后设计了一个利用协调反导拦截网络(CAMIN)系统的应用。此应用程序是基于安全TMO的安全CAMIN,该TMO在CAMIN环境中应用实时UCON (RT-UCON)
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A Profile for Safety Critical Java Using Multi-Agent Principles for Implementing an Organic Real-Time Middleware Compositional Schedulability Analysis of Hierarchical Real-Time Systems Analyzing Behavior of Concurrent Software Designs for Embedded Systems Detection of Fractal Breakdowns by the Novel Real-Time Pattern Detection Model (Enhanced-RTPD+Holder Exponent) for Web Applications
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1