Skip to main content
Top
Published in: Automatic Control and Computer Sciences 8/2018

01-12-2018

Implementation of Mandatory Access Control in Distributed Systems

Authors: S. V. Belim, S. Yu. Belim

Published in: Automatic Control and Computer Sciences | Issue 8/2018

Login to get access

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The implementation of mandatory distribution of access in distributed systems taking into account a user hierarchy is considered. The access control is based on the scheme of preliminary key distribution similar to KDP-scheme. The algorithm of building a family of subsets taking into account a user hierarchy was developed.
Literature
1.
go back to reference Vasiliev, Y.S., Zegzhda, P.D., and Zegzhda, D.P., Providing security for automated process control systems at hydropower engineering facilities, Thermal Eng., 2016, vol. 63, no. 13, pp. 948–956. Vasiliev, Y.S., Zegzhda, P.D., and Zegzhda, D.P., Providing security for automated process control systems at hydropower engineering facilities, Thermal Eng., 2016, vol. 63, no. 13, pp. 948–956.
2.
go back to reference Konoplev, A.S. and Kalinin, M.O., Access control method in distributed grid computing networks, Autom. Control Comput. Sci., 2015, vol. 49, no. 8, pp. 679–683. Konoplev, A.S. and Kalinin, M.O., Access control method in distributed grid computing networks, Autom. Control Comput. Sci., 2015, vol. 49, no. 8, pp. 679–683.
3.
go back to reference Kalinin, M., Krundyshev, V., Rezedinova, E., and Zegzhda, P., Role-based access control for vehicular adhoc networks, IEEE International Black Sea Conference on Communications and Networking, June 4–7, 2018, Batumi, 2018. doi 10.1109/BlackSeaCom.2018.8433628 Kalinin, M., Krundyshev, V., Rezedinova, E., and Zegzhda, P., Role-based access control for vehicular adhoc networks, IEEE International Black Sea Conference on Communications and Networking, June 4–7, 2018, Batumi, 2018. doi 10.1109/BlackSeaCom.2018.8433628
4.
go back to reference Blom, R., An optimal class of symmetric key generation systems, Proc. 84 EUROCRYPT 84 Workshop on Advances in Cryptology: Theory and Application of Cryptographic Techniques, 1985, pp. 335–338. Blom, R., An optimal class of symmetric key generation systems, Proc. 84 EUROCRYPT 84 Workshop on Advances in Cryptology: Theory and Application of Cryptographic Techniques, 1985, pp. 335–338.
5.
go back to reference Mitchell, C.J. and Piper, C., Key storage in secure networks, Discrete Appl. Math., 1988, vol. 21, pp. 215–228. Mitchell, C.J. and Piper, C., Key storage in secure networks, Discrete Appl. Math., 1988, vol. 21, pp. 215–228.
6.
go back to reference Belim, S.V., Belim, S.Yu., and Polyakov, S.Yu., Implementation of discretionary access sharing using a modified Blom scheme for preliminary key distribution, Probl. Inf. Bezop., Komp’yut. Sist., 2015, no. 3, pp. 72–76. Belim, S.V., Belim, S.Yu., and Polyakov, S.Yu., Implementation of discretionary access sharing using a modified Blom scheme for preliminary key distribution, Probl. Inf. Bezop., Komp’yut. Sist., 2015, no. 3, pp. 72–76.
7.
go back to reference Belim, S.V. and Belim, S.Yu., Modification of the scheme for preliminary distribution of Blom keys with regard to simplex channels, Probl. Inf. Bezop., Komp’yut. Sist., 2017, no. 3, pp. 82–86. Belim, S.V. and Belim, S.Yu., Modification of the scheme for preliminary distribution of Blom keys with regard to simplex channels, Probl. Inf. Bezop., Komp’yut. Sist., 2017, no. 3, pp. 82–86.
8.
go back to reference Belim, S.V. and Belim, S.Yu., KDP scheme of preliminary key distribution in discretionary security policy, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 777–786. Belim, S.V. and Belim, S.Yu., KDP scheme of preliminary key distribution in discretionary security policy, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 777–786.
9.
go back to reference Belim, S.V. and Belim, S.Yu., The VPN implementation on base of the KDP-scheme, CEUR Workshop Proc., 2016, vol. 1732. http://ceur-ws.org/Vol-1732/paper3.pdf. Belim, S.V. and Belim, S.Yu., The VPN implementation on base of the KDP-scheme, CEUR Workshop Proc., 2016, vol. 1732. http://​ceur-ws.​org/​Vol-1732/​paper3.​pdf.​
10.
go back to reference Belim, S.V. and Bogachenko, N.F., Distribution of cryptographic keys in systems with a hierarchy of objects, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 773–776. Belim, S.V. and Bogachenko, N.F., Distribution of cryptographic keys in systems with a hierarchy of objects, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 773–776.
11.
go back to reference Dyer, M., Fenner, T., Frieze, A., and Thomason, A., On key storage in secure networks, J. Cryptol., 1995, vol. 8, pp. 189–200. Dyer, M., Fenner, T., Frieze, A., and Thomason, A., On key storage in secure networks, J. Cryptol., 1995, vol. 8, pp. 189–200.
12.
go back to reference O’Keefe, C.M., Applications of finite geometries in information security, Australas. J. Comb., 1993, vol. 7, pp. 195–212. O’Keefe, C.M., Applications of finite geometries in information security, Australas. J. Comb., 1993, vol. 7, pp. 195–212.
Metadata
Title
Implementation of Mandatory Access Control in Distributed Systems
Authors
S. V. Belim
S. Yu. Belim
Publication date
01-12-2018
Publisher
Pleiades Publishing
Published in
Automatic Control and Computer Sciences / Issue 8/2018
Print ISSN: 0146-4116
Electronic ISSN: 1558-108X
DOI
https://doi.org/10.3103/S0146411618080357

Other articles of this Issue 8/2018

Automatic Control and Computer Sciences 8/2018 Go to the issue