Logical Language of Sertificate-Based Access Control in Security Models
Скачать файл:
URI (для ссылок/цитирований):
http://dl.acm.org/citation.cfm?doid=3058060.3058067https://elib.sfu-kras.ru/handle/2311/70254
Автор:
Kucherov, M. M.
Bogulskaya, N. A.
Коллективный автор:
Институт космических и информационных технологий
Кафедра прикладной математики и компьютерной безопасности
Дата:
2017-03Журнал:
ACM International Conference Proceeding SeriesКвартиль журнала в Scopus:
без квартиляБиблиографическое описание:
Kucherov, M. M. Logical Language of Sertificate-Based Access Control in Security Models [Текст] / M. M. Kucherov, N. A. Bogulskaya // ACM International Conference Proceeding Series: Proceedings of the 2017 International Conference on Cryptography, Security and Privacy ICCSP 2017. — 2017. — Т. 127411. — С. 131-135Аннотация:
Over the last decades, we have seen several policy models, including role-based access control and more recently, certificate-base control. These models are based on the important notion “flow relation”. In this work, we present a logical language of certificate-based access control. Our model presents the formal method of reasoning for discretionary access and defines logic to express a discretionary policy. We introduce, instead, material implication widely used in mathematics, and we show in a case study its ease in every sense. We find it allows the policy specifications to be interpreted more conveniently by practitioners and implemented in a simple way. Our evaluation shows that policies defined with material implication can be used for creation of the specification of a trust relationships policy and for checking safety of any computer system.
Коллекции:
Метаданные:
Показать полную информациюСвязанные материалы
Показаны похожие ресурсы по названию, автору или тематике.
-
LOGICAL LANGUAGE OF CERTIFICATE-BASED ACCESS CONTROL IN SECURITY MODELS
Kucherov, Mikhail M.; Bogulskaya, Nina A. (2017-03)Over the last decades, we have seen several policy models, including role-based access control and more recently, certificate-base control. These models are based on the important notion “flow relation”. In this work, we ... -
Extended Role Access Control Model for Web Applications Based on Path Hierarchy
Kononov, Dmitry D.; Isaev, Sergey V.; Кононов, Д.Д.; Исаев, С.В. (Сибирский федеральный университет. Siberian Federal University, 2018-11)Web applications security is a complex problem with several aspects. One aspect is access control according to specified security policy. Access control is accomplished by security model restrictions. This research is ... -
Electronic Control System of Rotating Axes of Long Based Road train
Abramov, Alexander; Blyankinshtein, Igor (2015-10)In the article the description of the developed electronic control system of rotary axes of the long road train is presented. The electrohydraulic control system contains two control paths: the main, the signals fulfilling ... -
SIRV-D Optimal Control Model for COVID-19 Propagation Scenarios
Petrakova, Viktoriya S.; Shaydurov, Vladimir V.; Петракова, Виктория С.; Шайдуров, Владимир В. (Сибирский федеральный университет. Siberian Federal University, 2023-02)The article presents the compartmental differential formulation of SIR-type for modeling the dynamics of the incidence of viral infections, in particular COVID-19, taking into account the ongoing vaccination campaign and ... -
Accelerated Phase-lock-loop Frequency Control Methods of User’s Equipment in Perspective Radio Navigation Systems
Kuzmin, Evgeny V. (Сибирский федеральный университет. Siberian Federal University, 2008-09)This paper investigates noise-immunity of accelerated phase-lock-loop frequency control algorithms of user equipment in perspective ground-based radio navigation systems. Three algorithms of accelerated phase-lock-loop ...