Access control mechanisms for a network operating system
نویسنده
چکیده
The growing recognition of the need for computer system security has resulted in the design, development and installation of "patches," packages and even new operating systems intended to provide higher degrees of data and systems protection. With the increased utilization of computer networks and current developments in the area of network operating systems (NOSs)40,19,30 the requirements for security in networking environments are also coming under investigation. 26,42 While research and development are still ongoing in the NOS area, it is vital to ensure that requirements for the security and integrity of data are well specified and that mechanisms for achieving the needed levels of systems protection are included in the design of the NOS. This will ensure that subsequent production versions of NOSs incorporate such mechanisms-thus, charting a course away from the otherwise inevitable "retrofit security" situation. Military applications have been the source of much of the computer and communications security knowledge. However, what is cost-effective in enhancing systems security for a military application may impose an untenable burden on a commercial or public system. To assist the manager/ analyst in identifying appropriate security mechanisms, this paper identifies a set of access control capabilities which should be considered for inclusion within a general purpose NOS. Before identifying the actual mechanisms involved in enhancing NOS security, an NOS environment is briefly described. An overview of computer network security requirements is then provided and suggested approaches are referenced. The second section identifies the specific access control functions required by the type of network operating system described in the first section. The implementation of these access control mechanisms in the NBS Experimental Net-
منابع مشابه
Access and Mobility Policy Control at the Network Edge
The fifth generation (5G) system architecture is defined as service-based and the core network functions are described as sets of services accessible through application programming interfaces (API). One of the components of 5G is Multi-access Edge Computing (MEC) which provides the open access to radio network functions through API. Using the mobile edge API third party analytics applications ...
متن کاملSeparating network control from routers with Software Defined Networking
Data networks have become increasingly complex nowadays. Even though technologies like Ethernet, IP protocol and packet forwarding is rather simple, control mechanisms like middleboxes, Access Control Lists (ACLs), firewalls, traffic engineering, VLANs, etc. have largely contributed to increasing their complexity. Primarily this is due to the lack of basic principles in networking. Networking s...
متن کامل18 Heavy traffic on a controlled motorway
Unlimited access to a motorway network can, in overloaded conditions, cause a loss of capacity. Ramp metering (signals on slip roads to control access to the motorway) can help avoid this loss of capacity. The design of ramp metering strategies has several features in common with the design of access control mechanisms in communication networks. Inspired by models and rate control mechanisms de...
متن کاملطراحی کنترل کننده پیش بین سیستم بویلر- توربین
A nonlinear model predictive control (NMPC) algorithm based on neural network is designed for boiler- turbine system. The boiler–turbine system presents a challenging control problem owing to its severe nonlinearity over a wide operation range, tight operating constraints on control move and strong coupling among variables. The nonlinear system is identified by MLP neural network and neur...
متن کاملLayered multipoint network defense and security policy enforcement
This paper discusses the enhancement of security in general purpose operating systems, especially related to threats caused by internetworking, using extensions to operating systems. Such mechanisms have a significantly larger basis for reaching security policy decisions than older host-level security mechanisms and firewalls. By layering defensive mechanisms yet enforcing a consistent security...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010