کد مقاله کد نشریه سال انتشار مقاله انگلیسی نسخه تمام متن
455619 695516 2015 9 صفحه PDF دانلود رایگان
عنوان انگلیسی مقاله ISI
Password systems: Design and implementation
ترجمه فارسی عنوان
سیستم های رمز عبور: طراحی و پیاده سازی
کلمات کلیدی
موضوعات مرتبط
مهندسی و علوم پایه مهندسی کامپیوتر شبکه های کامپیوتری و ارتباطات
چکیده انگلیسی


• A significant protection problem is to specify the access privileges held by each active subject on the protected objects.
• We associate a password system with each object, featuring a password for each access privilege.
• Access privileges are partitioned into privilege levels, for distribution and revocation.
• Password systems are implemented as hierarchical bidimensional one-way chains.

Critical infrastructures require protection systems that are both flexible and efficient. Flexibility is essential to capture the multi-organizational and state-based nature of these systems, efficiency is necessary to cope with limitations of hardware resources. To meet these requirements, we consider a classical protection environment featuring subjects that attempt to access the protected objects. We approach the problem of specifying the access privileges held by each subject. Our protection model associates a password system with each object; the password system features a password for each access privilege defined for this object. A subject can access the object if it holds a key matching one of the passwords in the password system, and the access privilege corresponding to this password permits to accomplish the access. Password systems are implemented as hierarchical bidimensional one-way chains. Trade-offs are possible between the memory requirements for storage of a password system and the processing time necessary to validate a key.

Figure optionsDownload as PowerPoint slide

ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Computers & Electrical Engineering - Volume 47, October 2015, Pages 318–326
نویسندگان
, ,