DocumentCode :
1923993
Title :
Dependable and secure TMO scheme
Author :
Kim, Jungin ; Thuraisingham, Bhavani
Author_Institution :
Dept. of Comput. Sci., Texas Univ., Richardson, TX
fYear :
2006
fDate :
24-26 April 2006
Abstract :
In a real-time distributed computing environment, security is critical to protect the system from unauthorized access especially since such systems are being used in time critical applications. Access control mechanisms have been introduced during the last several decades and have offered a basic and powerful means for enforcing security. In this paper, we examine the concepts of the TMO (time triggered message triggered object) scheme that provides guaranteed real-time services in a distributed object computing environment. We also examine access control mechanisms; such as the traditional model, the RBAC (role-based access control) model and the UCON (usage control) model. The main contribution of this paper is applying the traditional, RBAC and UCON models to the TMO scheme in order to provide a secure real-time distributed environment
Keywords :
authorisation; distributed processing; real-time systems; TMO scheme; access control mechanisms; real-time distributed object computing environment; time triggered message triggered object scheme; Access control; Computer crime; Computer science; Data security; Distributed computing; Information security; Intelligent transportation systems; Military computing; Power system security; Real time systems;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Object and Component-Oriented Real-Time Distributed Computing, 2006. ISORC 2006. Ninth IEEE International Symposium on
Conference_Location :
Gyeongju
Print_ISBN :
0-7695-2561-X
Type :
conf
DOI :
10.1109/ISORC.2006.27
Filename :
1630472
Link To Document :
بازگشت