会议论文详细信息
4th International Conference on Applied Materials and Manufacturing Technology
Analysis of the Appropriate Security Models to Apply in a Distributed Architecture
材料科学;机械制造
Toapanta, Moisés^1 ; Nazareno, Jean^1 ; Tingo, Raúl^1 ; Mendoza, Felix^1 ; Orizaga, Antonio^2 ; Mafla, Enrique^3
Computer Science Department, Universidad Politécnica Salesiana - Sede Guayaquil, Chambers 227 and 5 of junio, Guayaquil, Ecuador^1
Informations Systems Department CUCEA, Universidad de Guadalajara, Nucleo Universitario, Periférico Norte No 799, Los Belenes, Zapopan, Jalisco
C.P. 45100, Mexico^2
Faculty in Engineering Systems, Escuela Politécnica Nacional, Ladrón de Guevara, Quito
E11-253, Ecuador^3
关键词: Authentication information;    Bell-lapadula models;    Deductive methods;    Distributed architecture;    Prototype models;    Security model;    Unauthorized access;    Well being;   
Others  :  https://iopscience.iop.org/article/10.1088/1757-899X/423/1/012165/pdf
DOI  :  10.1088/1757-899X/423/1/012165
学科分类:材料科学(综合)
来源: IOP
PDF
【 摘 要 】

The availability of information generated on a large scale has allowed sharing without considering the levels of risk that can be caused by not considering the confidentiality, integrity and authenticity of the information; any misuse, destruction, modification or unauthorized access with confidentiality, integrity and authentication information in an organization may affect the privacy or well-being of individuals and society. The objective is to perform the analysis of security models to generate a prototype of model to mitigate information security problems. The deductive method was used to review and analyse the referenced information and identify the ideal security models that allow to improve the security of information in a distributed architecture. Turned out a prototype model merging the characteristics of the BiBa model and the Bell-Lapadula model, creating a new model that offers integrity, confidentiality and access control as an alternative to improve the security of information. It was concluded that it is necessary to have an appropriate security model that conforms to the objectives, operational, tactical and strategic of the organization to mitigate the confidentiality, integrity and authenticity.

【 预 览 】
附件列表
Files Size Format View
Analysis of the Appropriate Security Models to Apply in a Distributed Architecture 245KB PDF download
  文献评价指标  
  下载次数:3次 浏览次数:17次