TCBAC: An Access Control Model for Remote Calibration System

نویسندگان

  • Zhuokui Wu
  • Guixiong Liu
چکیده

In order to improve the reliability of remote calibration system, a task-constraint-based access control model named TCBAC is presented according to the characteristic of remote calibration system. TCBAC conducts access control according to task. It defines authorization constraints and execution constraints by the characteristics of task and the relation among tasks. Users can obtain a task authorization only when the authorization constraint is satisfied, and can execute a task only when the execution constraint is satisfied. The performance of TCBAC is analyzed by applying it to a remote calibration system and comparing it with DAC, MAC and RBAC which are commonly used access control models at present. The results show that TCBAC has the advantages of considering context and dynamics, it more fully satisfies the principle of least privilege and the principle of separation of duty and has good expansibility.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An automatic test case generator for evaluating implementation of access control policies

One of the main requirements for providing software security is the enforcement of access control policies which aim to protect resources of the system against unauthorized accesses. Any error in the implementation of such policies may lead to undesirable outcomes. For testing the implementation of access control policies, it is preferred to use automated methods which are faster and more relia...

متن کامل

Access control in ultra-large-scale systems using a data-centric middleware

  The primary characteristic of an Ultra-Large-Scale (ULS) system is ultra-large size on any related dimension. A ULS system is generally considered as a system-of-systems with heterogeneous nodes and autonomous domains. As the size of a system-of-systems grows, and interoperability demand between sub-systems is increased, achieving more scalable and dynamic access control system becomes an im...

متن کامل

A combination of semantic and attribute-based access control model for virtual organizations

A Virtual Organization (VO) consists of some real organizations with common interests, which aims to provide inter organizational associations to reach some common goals by sharing their resources with each other. Providing security mechanisms, and especially a suitable access control mechanism, which enforces the defined security policy is a necessary requirement in VOs. Since VO is a complex ...

متن کامل

On-Orbit Geometric Calibration Model and Its Applications for High-Resolution Optical Satellite Imagery

On-orbit geometric calibration is a key technology to guarantee the geometric quality of high-resolution optical satellite imagery. In this paper, we present an approach for the on-orbit geometric calibration of high-resolution optical satellite imagery, focusing on two core problems: constructing an on-orbit geometric calibration model and proposing a robust calculation method. First, a rigoro...

متن کامل

A Petri-net Model for Operational Cycle in SCADA Systems

Supervisory control and data acquisition (SCADA) system monitors and controls industrial processes in critical infrastructures (CIs) and plays the vital role in maintaining the reliability of CIs such as power, oil, and gas system. In fact, SCADA system refers to the set of control process, which measures and monitors sensors in remote substations from a control center. These sensors usually ha...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • JSW

دوره 8  شماره 

صفحات  -

تاریخ انتشار 2013