Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "access control of information systems" wg kryterium: Wszystkie pola


Wyświetlanie 1-3 z 3
Tytuł:
Modeling and design of role engineering in development of access control for dynamic information systems
Autorzy:
Poniszewska-Marańda, A.
Powiązania:
https://bibliotekanauki.pl/articles/200307.pdf
Data publikacji:
2013
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
access control of information systems
access control models
role engineering
usage control
Opis:
Nowadays, the growth and complexity of functionalities of current information systems, especially dynamic, distributed and heterogeneous information systems, makes the design and creation of such systems a difficult task and at the same time, strategic for businesses. A very important stage of data protection in an information system is the creation of a high level model, independent of the software, satisfying the needs of system protection and security. The process of role engineering, i.e. the identification of roles and setting up in an organization is a complex task. The paper presents the modeling and design stages in the process of role engineering in the aspect of security schema development for information systems, in particular for dynamic, distributed information systems, based on the role concept and the usage concept. Such a schema is created first of all during the design phase of a system. Two actors should cooperate with each other in this creation process, the application developer and the security administrator, to determine the minimal set of user’s roles in agreement with the security constraints that guarantee the global security coherence of the system.
Źródło:
Bulletin of the Polish Academy of Sciences. Technical Sciences; 2013, 61, 3; 569-579
0239-7528
Pojawia się w:
Bulletin of the Polish Academy of Sciences. Technical Sciences
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Concept of Joint Functioning of Access Control Systems
Autorzy:
Strelbitskyi, Mykhailo
Mazur, Valentyn
Prokopenko, Evgenii
Rachok, Roman
Mul, Dmytro
Powiązania:
https://bibliotekanauki.pl/articles/2200963.pdf
Data publikacji:
2023
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
access control model
concept
information system
telecommunication system
modernization
Opis:
Modern integrated information and telecommunication systems are upgraded on a continuous basis. Such systems contain both new and old components. The approaches to developing individual components of access control systems are different in the majority of cases. As a rule, modernization of outdated but efficient systems that have been operating without any failures for long periods of time is economically unfeasible. Such an approach requires that different subsystems function based on shared data. This necessitates the coordination of various access control systems in order to ensure proper information security levels. This article examines how joint functioning of various versions of access control systems deployed in IT and telecommunication spheres may be achieved at the stage of their modernization. Potential ways in which information flows may bypass the security policies of one of the access control systems concerned are determined. The authors discuss traditional access control models. For role-based and thematic access control models, specific hypotheses are formulated to comply with security policies when different versions of access control systems work together. The structure of the model assuming that different versions of access control systems operate jointly has been developed. Based on the model, the necessary and sufficient conditions are determined under which unauthorized information flows are prevented. The security theorem for the joint functioning of different versions of access control systems is presented and proved. The results of the study showed that the methodological basis for coordinating access control models applicable to information and telecommunication systems undergoing modernization consists in observing, separately, the equality of information flows between shared objects in each of the versions of the access control systems. The approaches developed in this article can be extended to combined access control systems.
Źródło:
Journal of Telecommunications and Information Technology; 2023, 1; 30--36
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
O organizacji i implementacji mechanizmów dostępu do informacji wrażliwych przetwarzanych w systemach teleinformatycznych
On organization and implementation of access control mechanisms to sensitive information in computer systems
Autorzy:
Liderman, K.
Powiązania:
https://bibliotekanauki.pl/articles/209568.pdf
Data publikacji:
2008
Wydawca:
Wojskowa Akademia Techniczna im. Jarosława Dąbrowskiego
Tematy:
informatyka
uwierzytelnianie
autoryzacja
sterowanie dostępem
klasyfikacja informacji
model Balla-LaPaduli
authentication
authorization
access control
categorization of information
Bell-LaPadula model
Opis:
Artykuł zawiera omówienie, na przykładzie modelu Balla-LaPaduli, tematyki sterowania dostępem do informacji klasyfikowanej. W artykule przedstawiono m.in. zarys koncepcji systemu ochrony informacji i metod uwierzytelniania podmiotów oraz wnioski wynikające z praktycznego zastosowania modelu Bella-LaPaduli.
The paper discusses - on the example of Bell-LaPadula model - questions of access control to categorized information. Also the concepts of information security system and methods of subject authentication and conclusions arising from Bell-LaPadula model practical application are given.
Źródło:
Biuletyn Wojskowej Akademii Technicznej; 2008, 57, 4; 233-256
1234-5865
Pojawia się w:
Biuletyn Wojskowej Akademii Technicznej
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-3 z 3

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies