The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Because it governs all potential communication between entities, the need of security policies is nowadays increasingly growing and not to be any more proved. Moreover, in today's technological society and to allow applications perpetuity, communication networks must support the collaboration between entities to face up any unavailability or flinching. On others hands, it must allow to a user without...
Distributed systems could be more secured with a distributed trust model based on either PKI or Kerberos. However, it becomes difficult to establish trust relationship across heterogeneous domains due to different actual trust mechanism and security policy as well as the intrinsic flaw of each trust model. This paper is to propose a new high-compatible model, capable of working under the condition...
An access control system is a mandatory step in the implementation of security policy. The algebra of security introduced by McLean is not enough expressive to model an access control system. Several models appeared thereafter, namely the mandatory models and discretionary models. In this paper we will use the graphs of privileges and the Marked Petri Nets in order to model formally the access control...
One of the major threats that an enterprise information system networks are facing today is the internal threat. In this paper we develop a formal network access control model as per ISO/IEC security evaluation criteria - common criteria to provide a formal framework for implementing an Internal threat protection security solution in network computing environment. We used network interpretation of...
As a number of home network services are available and smart environment is expanding into ubiquitous computing environment, we need to protect smart environment system from illegal accesses and a variety of threats. Smart environment is exposed to various cyber attacks of Internet, involves hacking, malicious codes, worms, viruses, DoS attacks, and eavesdropping since it is connected to Internet...
The access control is the multitudinous computer security solution one kind, also is the most direct-viewing most natural one kind of plan, but based on role access control (RBAC) is the most influential high-level access control model, however, as a result of the grid cross organization, the tendency, isomerism characteristic, established the access control in the grid coordination design system...
Conflicts can occur in access control models due to many reasons. Conflict resolution in real-time can be a challenging task due to the complexity of the access control rules. For a large number of access rules for a given service, detecting exactly which rules caused conflicts can be a daunting task. This paper describes an algorithm to resolve conflicts using the ARSL (Authorization Rule Specification...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.