Implementation of Mandatory Access Control in Distributed Systems
- Published:
- Volume 52, pages 1124–1126, (2018)
- Cite this article
-
358 Accesses
-
10 Citations
-
3 Altmetric
Abstract
The implementation of mandatory distribution of access in distributed systems taking into account a user hierarchy is considered. The access control is based on the scheme of preliminary key distribution similar to KDP-scheme. The algorithm of building a family of subsets taking into account a user hierarchy was developed.
This is a preview of subscription content, log in via an institution to check access.
Access this article
Subscribe and save
- Starting from 10 chapters or articles per month
- Access and download chapters and articles from more than 300k books and 2,500 journals
- Cancel anytime
Buy Now
Price includes VAT (Japan)
Instant access to the full article PDF.
Similar content being viewed by others
KDP scheme of preliminary key distribution in discretionary security policy
Comprehensive evaluation of key management hierarchies for outsourced data
Explore related subjects
Discover the latest articles, books and news in related subjects, suggested using machine learning.REFERENCES
Vasiliev, Y.S., Zegzhda, P.D., and Zegzhda, D.P., Providing security for automated process control systems at hydropower engineering facilities, Thermal Eng., 2016, vol. 63, no. 13, pp. 948–956.
Konoplev, A.S. and Kalinin, M.O., Access control method in distributed grid computing networks, Autom. Control Comput. Sci., 2015, vol. 49, no. 8, pp. 679–683.
Kalinin, M., Krundyshev, V., Rezedinova, E., and Zegzhda, P., Role-based access control for vehicular adhoc networks, IEEE International Black Sea Conference on Communications and Networking, June 4–7, 2018, Batumi, 2018. doi 10.1109/BlackSeaCom.2018.8433628
Blom, R., An optimal class of symmetric key generation systems, Proc. 84 EUROCRYPT 84 Workshop on Advances in Cryptology: Theory and Application of Cryptographic Techniques, 1985, pp. 335–338.
Mitchell, C.J. and Piper, C., Key storage in secure networks, Discrete Appl. Math., 1988, vol. 21, pp. 215–228.
Belim, S.V., Belim, S.Yu., and Polyakov, S.Yu., Implementation of discretionary access sharing using a modified Blom scheme for preliminary key distribution, Probl. Inf. Bezop., Komp’yut. Sist., 2015, no. 3, pp. 72–76.
Belim, S.V. and Belim, S.Yu., Modification of the scheme for preliminary distribution of Blom keys with regard to simplex channels, Probl. Inf. Bezop., Komp’yut. Sist., 2017, no. 3, pp. 82–86.
Belim, S.V. and Belim, S.Yu., KDP scheme of preliminary key distribution in discretionary security policy, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 777–786.
Belim, S.V. and Belim, S.Yu., The VPN implementation on base of the KDP-scheme, CEUR Workshop Proc., 2016, vol. 1732. http://ceur-ws.org/Vol-1732/paper3.pdf.
Belim, S.V. and Bogachenko, N.F., Distribution of cryptographic keys in systems with a hierarchy of objects, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 773–776.
Dyer, M., Fenner, T., Frieze, A., and Thomason, A., On key storage in secure networks, J. Cryptol., 1995, vol. 8, pp. 189–200.
O’Keefe, C.M., Applications of finite geometries in information security, Australas. J. Comb., 1993, vol. 7, pp. 195–212.
Additional information
Translated by M. Kromin
About this article
Cite this article
Belim, S.V., Belim, S.Y. Implementation of Mandatory Access Control in Distributed Systems. Aut. Control Comp. Sci. 52, 1124–1126 (2018). https://doi.org/10.3103/S0146411618080357
Received:
Published:
Version of record:
Issue date:
DOI: https://doi.org/10.3103/S0146411618080357
Share this article
Anyone you share the following link with will be able to read this content:
Sorry, a shareable link is not currently available for this article.
Provided by the Springer Nature SharedIt content-sharing initiative