The Model of Internal Security Access Control for Integrated Information System
Here we present an internal security access control model for information systems based on subject-object access model. The authors represent a new complex security protocol and use formal methods of BAN-logics for analyzing and verification.
Main Authors: | S.V. Zapechnikov, A. K. Pleshkov |
---|---|
Format: | Article |
Language: | English |
Published: |
Moscow Engineering Physics Institute
2011-06-01
|
Series: | Bezopasnostʹ Informacionnyh Tehnologij |
Subjects: | |
Online Access: | https://bit.mephi.ru/index.php/bit/article/view/509 |
Similar Items
-
Need an Information Security in Access Control System?
by: V. R. Petrov
Published: (2011-12-01) -
The Control of Information Security Indicators for Information Resources in Distributed Computing Environment Bases on the Reservation Strategies with Fractional Redundancy Rate
by: S. V. Zapechnikov
Published: (2011-12-01) -
The Security of Distributed Computing Systems with Various Reservation Strategies of Information Resources
by: S. V. Zapechnikov
Published: (2011-09-01) -
Enabling Telecare Medical Information Systems With Strong Authentication and Anonymity
by: Hu Xiong, et al.
Published: (2017-01-01) -
Banned Books behind Bars: Prototyping a Data Repository to Combat Arbitrary Censorship Practices in U.S. Prisons
by: Kate Cauley
Published: (2020-10-01)