{"title":"Dependable and secure TMO scheme","authors":"Jungin Kim, B. Thuraisingham","doi":"10.1109/ISORC.2006.27","DOIUrl":null,"url":null,"abstract":"In a real-time distributed computing environment, security is critical to protect the system from unauthorized access especially since such systems are being used in time critical applications. Access control mechanisms have been introduced during the last several decades and have offered a basic and powerful means for enforcing security. In this paper, we examine the concepts of the TMO (time triggered message triggered object) scheme that provides guaranteed real-time services in a distributed object computing environment. We also examine access control mechanisms; such as the traditional model, the RBAC (role-based access control) model and the UCON (usage control) model. The main contribution of this paper is applying the traditional, RBAC and UCON models to the TMO scheme in order to provide a secure real-time distributed environment","PeriodicalId":212174,"journal":{"name":"Ninth IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC'06)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2006-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Ninth IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC'06)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISORC.2006.27","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7
Abstract
In a real-time distributed computing environment, security is critical to protect the system from unauthorized access especially since such systems are being used in time critical applications. Access control mechanisms have been introduced during the last several decades and have offered a basic and powerful means for enforcing security. In this paper, we examine the concepts of the TMO (time triggered message triggered object) scheme that provides guaranteed real-time services in a distributed object computing environment. We also examine access control mechanisms; such as the traditional model, the RBAC (role-based access control) model and the UCON (usage control) model. The main contribution of this paper is applying the traditional, RBAC and UCON models to the TMO scheme in order to provide a secure real-time distributed environment