What Should a Good Security Model Be?
نویسنده
چکیده
In this article we survey a number of security models – which range from the first models to newly proposed approaches – in an attempt to answer the question of what we want our security model to be. The emphasis of this work is not on past or current security models, but rather on new approaches that have been proposed in the literature but have not yet found their way to the end user. The models described in this work provide unusual ways of addressing security needs and may be difficult to employ due to drastic differences from the currently accepted norms. These models, however, may have useful properties that the current systems do not possess, and might provide more efficient ways of securing our systems.
منابع مشابه
Europe and the Challenge of Energy Security: Limitations and Strategies
The increasing dependence of European Union member countries on imported oil and gas has led to concerns about energy supply and security. At the same time the share of clean energy in Europe’s energy consumption basket is increasing due to environmental issues. About a quarter of all energy consumption in the EU is natural gas, and most EU member states import almost all of their energy resou...
متن کاملModeling of Electronic Health Management for Islamic Republic of Iran Social Security Organization
Background: Social Security Organization with more than 40 million insured people, supplies therapeutic services to nearly fifty percent of the country’s population. This volume of service needs a good update and on line planning, organizing, coordination, staffing, and budgeting. Electronic health is improving day to day and is a good tool in helping the Social Security Organization in conduct...
متن کاملA semantic-aware role-based access control model for pervasive computing environments
Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...
متن کاملDesigning a career path model based on knowledge management model in Mazandaran Social Security Organization
Background and Aim: Knowledge management is the cycle of discovery, production, storage, distribution, and practical application of knowledge in the organization. Occurs. Work experiences, social groups, and outcomes that determine the path to progress may be limited (in the form of a profession or organization) or broad (the path to progress in society in a wide range of different professions ...
متن کاملThe Presentation of an Ideal Safe SMS based model in mobile Electronic commerce using Encryption hybrid algorithms AES and ECC
Mobile commerce is whatever electronic transfer or transaction via a mobile modem through a mobile net in which the true value or advance payment is done for goods, services or information. A mobile payment system should be beneficial for all related persons. For a payment system to be a Successful system, End-user, seller, exporter and operators should see a additional value in it. End-user ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004