Skip to main content
Erschienen in: Automatic Control and Computer Sciences 8/2018

01.12.2018

Implementation of Mandatory Access Control in Distributed Systems

verfasst von: S. V. Belim, S. Yu. Belim

Erschienen in: Automatic Control and Computer Sciences | Ausgabe 8/2018

Einloggen, um Zugang zu erhalten

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The implementation of mandatory distribution of access in distributed systems taking into account a user hierarchy is considered. The access control is based on the scheme of preliminary key distribution similar to KDP-scheme. The algorithm of building a family of subsets taking into account a user hierarchy was developed.
Literatur
1.
Zurück zum Zitat Vasiliev, Y.S., Zegzhda, P.D., and Zegzhda, D.P., Providing security for automated process control systems at hydropower engineering facilities, Thermal Eng., 2016, vol. 63, no. 13, pp. 948–956. Vasiliev, Y.S., Zegzhda, P.D., and Zegzhda, D.P., Providing security for automated process control systems at hydropower engineering facilities, Thermal Eng., 2016, vol. 63, no. 13, pp. 948–956.
2.
Zurück zum Zitat Konoplev, A.S. and Kalinin, M.O., Access control method in distributed grid computing networks, Autom. Control Comput. Sci., 2015, vol. 49, no. 8, pp. 679–683. Konoplev, A.S. and Kalinin, M.O., Access control method in distributed grid computing networks, Autom. Control Comput. Sci., 2015, vol. 49, no. 8, pp. 679–683.
3.
Zurück zum Zitat Kalinin, M., Krundyshev, V., Rezedinova, E., and Zegzhda, P., Role-based access control for vehicular adhoc networks, IEEE International Black Sea Conference on Communications and Networking, June 4–7, 2018, Batumi, 2018. doi 10.1109/BlackSeaCom.2018.8433628 Kalinin, M., Krundyshev, V., Rezedinova, E., and Zegzhda, P., Role-based access control for vehicular adhoc networks, IEEE International Black Sea Conference on Communications and Networking, June 4–7, 2018, Batumi, 2018. doi 10.1109/BlackSeaCom.2018.8433628
4.
Zurück zum Zitat Blom, R., An optimal class of symmetric key generation systems, Proc. 84 EUROCRYPT 84 Workshop on Advances in Cryptology: Theory and Application of Cryptographic Techniques, 1985, pp. 335–338. Blom, R., An optimal class of symmetric key generation systems, Proc. 84 EUROCRYPT 84 Workshop on Advances in Cryptology: Theory and Application of Cryptographic Techniques, 1985, pp. 335–338.
5.
Zurück zum Zitat Mitchell, C.J. and Piper, C., Key storage in secure networks, Discrete Appl. Math., 1988, vol. 21, pp. 215–228. Mitchell, C.J. and Piper, C., Key storage in secure networks, Discrete Appl. Math., 1988, vol. 21, pp. 215–228.
6.
Zurück zum Zitat Belim, S.V., Belim, S.Yu., and Polyakov, S.Yu., Implementation of discretionary access sharing using a modified Blom scheme for preliminary key distribution, Probl. Inf. Bezop., Komp’yut. Sist., 2015, no. 3, pp. 72–76. Belim, S.V., Belim, S.Yu., and Polyakov, S.Yu., Implementation of discretionary access sharing using a modified Blom scheme for preliminary key distribution, Probl. Inf. Bezop., Komp’yut. Sist., 2015, no. 3, pp. 72–76.
7.
Zurück zum Zitat Belim, S.V. and Belim, S.Yu., Modification of the scheme for preliminary distribution of Blom keys with regard to simplex channels, Probl. Inf. Bezop., Komp’yut. Sist., 2017, no. 3, pp. 82–86. Belim, S.V. and Belim, S.Yu., Modification of the scheme for preliminary distribution of Blom keys with regard to simplex channels, Probl. Inf. Bezop., Komp’yut. Sist., 2017, no. 3, pp. 82–86.
8.
Zurück zum Zitat Belim, S.V. and Belim, S.Yu., KDP scheme of preliminary key distribution in discretionary security policy, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 777–786. Belim, S.V. and Belim, S.Yu., KDP scheme of preliminary key distribution in discretionary security policy, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 777–786.
9.
Zurück zum Zitat Belim, S.V. and Belim, S.Yu., The VPN implementation on base of the KDP-scheme, CEUR Workshop Proc., 2016, vol. 1732. http://ceur-ws.org/Vol-1732/paper3.pdf. Belim, S.V. and Belim, S.Yu., The VPN implementation on base of the KDP-scheme, CEUR Workshop Proc., 2016, vol. 1732. http://​ceur-ws.​org/​Vol-1732/​paper3.​pdf.​
10.
Zurück zum Zitat Belim, S.V. and Bogachenko, N.F., Distribution of cryptographic keys in systems with a hierarchy of objects, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 773–776. Belim, S.V. and Bogachenko, N.F., Distribution of cryptographic keys in systems with a hierarchy of objects, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 773–776.
11.
Zurück zum Zitat Dyer, M., Fenner, T., Frieze, A., and Thomason, A., On key storage in secure networks, J. Cryptol., 1995, vol. 8, pp. 189–200. Dyer, M., Fenner, T., Frieze, A., and Thomason, A., On key storage in secure networks, J. Cryptol., 1995, vol. 8, pp. 189–200.
12.
Zurück zum Zitat O’Keefe, C.M., Applications of finite geometries in information security, Australas. J. Comb., 1993, vol. 7, pp. 195–212. O’Keefe, C.M., Applications of finite geometries in information security, Australas. J. Comb., 1993, vol. 7, pp. 195–212.
Metadaten
Titel
Implementation of Mandatory Access Control in Distributed Systems
verfasst von
S. V. Belim
S. Yu. Belim
Publikationsdatum
01.12.2018
Verlag
Pleiades Publishing
Erschienen in
Automatic Control and Computer Sciences / Ausgabe 8/2018
Print ISSN: 0146-4116
Elektronische ISSN: 1558-108X
DOI
https://doi.org/10.3103/S0146411618080357

Weitere Artikel der Ausgabe 8/2018

Automatic Control and Computer Sciences 8/2018 Zur Ausgabe

Neuer Inhalt