4th International Conference on Applied Materials and Manufacturing Technology | |
Analysis of the Appropriate Security Models to Apply in a Distributed Architecture | |
材料科学;机械制造 | |
Toapanta, Moisés^1 ; Nazareno, Jean^1 ; Tingo, Raúl^1 ; Mendoza, Felix^1 ; Orizaga, Antonio^2 ; Mafla, Enrique^3 | |
Computer Science Department, Universidad Politécnica Salesiana - Sede Guayaquil, Chambers 227 and 5 of junio, Guayaquil, Ecuador^1 | |
Informations Systems Department CUCEA, Universidad de Guadalajara, Nucleo Universitario, Periférico Norte No 799, Los Belenes, Zapopan, Jalisco | |
C.P. 45100, Mexico^2 | |
Faculty in Engineering Systems, Escuela Politécnica Nacional, Ladrón de Guevara, Quito | |
E11-253, Ecuador^3 | |
关键词: Authentication information; Bell-lapadula models; Deductive methods; Distributed architecture; Prototype models; Security model; Unauthorized access; Well being; | |
Others : https://iopscience.iop.org/article/10.1088/1757-899X/423/1/012165/pdf DOI : 10.1088/1757-899X/423/1/012165 |
|
学科分类:材料科学(综合) | |
来源: IOP | |
【 摘 要 】
The availability of information generated on a large scale has allowed sharing without considering the levels of risk that can be caused by not considering the confidentiality, integrity and authenticity of the information; any misuse, destruction, modification or unauthorized access with confidentiality, integrity and authentication information in an organization may affect the privacy or well-being of individuals and society. The objective is to perform the analysis of security models to generate a prototype of model to mitigate information security problems. The deductive method was used to review and analyse the referenced information and identify the ideal security models that allow to improve the security of information in a distributed architecture. Turned out a prototype model merging the characteristics of the BiBa model and the Bell-Lapadula model, creating a new model that offers integrity, confidentiality and access control as an alternative to improve the security of information. It was concluded that it is necessary to have an appropriate security model that conforms to the objectives, operational, tactical and strategic of the organization to mitigate the confidentiality, integrity and authenticity.
【 预 览 】
Files | Size | Format | View |
---|---|---|---|
Analysis of the Appropriate Security Models to Apply in a Distributed Architecture | 245KB | download |