scholarly journals Requirements for Scalable Access Control and Security Management Architectures

2005 ◽  
Author(s):  
Angelos D. Keromytis ◽  
Jonathan M. Smith
2014 ◽  
Vol 526 ◽  
pp. 367-371
Author(s):  
Hai Xia Wang

In this paper, we propose a general discussion on the digital library security from the perspectives of management risk, security demand and target, the security architecture of library digital information. The specific solution for implementation is presented for the information security of library digital information in the aspects of hardware infrastructure security, firewall technology, encroachment test, access control, virus protection, data backup and security management.


2013 ◽  
Vol 756-759 ◽  
pp. 390-394
Author(s):  
Li Ting Gao ◽  
Zhen Yan Wang

This paper proposed a model for user security management. This model can establish the blacklist and white list to achieve the control of the user subsequent actions through monitoring the changing of user trust level. It also can establish trust policy based on assets importance and user trust level, specify the relationship between user trust and assets value and take it as a dynamic trust constraint for access control. The experiments show that this model combines trust level with access control mechanism; it can enhance the user security management.


Sensors ◽  
2021 ◽  
Vol 21 (20) ◽  
pp. 6815
Author(s):  
Yue Zhao ◽  
Bo Tian ◽  
Yiru Niu ◽  
Hao Zhang ◽  
Zhongqiang Yi ◽  
...  

As a typical application of sensor networks, there exist many information security problems in smart parks, such as confusion of personnel access, lack of security management, disorderly data flow, insufficient collection of audit evidence, and so on. Aiming at the scenario of personnel and equipment moving in different areas of smart parks, the paper proposes a joint authorization and dynamic access control mechanism, which can provide unified identity management services, access control services, and policy management services, and effectively solve the problem of multi-authorization in user identity and authority management. The license negotiation interaction protocol is designed to prevent common network attack threats in the process of identity authentication and authority management. In order to realize the tamper-proof storage of personnel and equipment movement trajectory, the paper also designs a movement trajectory traceability protocol based on a Merkle tree, which solves the problems of internal personnel malicious attack, trusted third-party dependency bottleneck, high overheads of tracking algorithms, and so on. The experimental results show that compared with the current security control mechanisms for sensor networks, the joint authorization, and dynamic access control mechanism can support multi-party authorization and traceability, while the overhead it generates in initialization, encryption, decryption, and key generation steps are basically the same as other mechanisms do.


Sign in / Sign up

Export Citation Format

Share Document