{"title":"目的标记发布协议对基于目的的标记(PM)协议的评价","authors":"T. Enokido, M. Takizawa","doi":"10.1109/NBiS.2009.58","DOIUrl":null,"url":null,"abstract":"Information systems are required to be not only secure but also consistent in presence of security threats and multiple conflicting transactions. There are many discussions on each of the security and concurrency control. In this paper, we discuss a novel synchronization protocol to make an information system secure and consistent. In the role-based access control model, authorized access requests are specified in roles. A transaction issued by a subject is assigned with a subfamily of roles named purpose. Based on the purpose concept, we discuss how to prevent illegal information flow to occur by performing conflicting transactions.","PeriodicalId":312802,"journal":{"name":"2009 International Conference on Network-Based Information Systems","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Evaluation of Purpose Mark Releasing Protocol for Purpose-based Marking (PM) Protocol\",\"authors\":\"T. Enokido, M. Takizawa\",\"doi\":\"10.1109/NBiS.2009.58\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Information systems are required to be not only secure but also consistent in presence of security threats and multiple conflicting transactions. There are many discussions on each of the security and concurrency control. In this paper, we discuss a novel synchronization protocol to make an information system secure and consistent. In the role-based access control model, authorized access requests are specified in roles. A transaction issued by a subject is assigned with a subfamily of roles named purpose. Based on the purpose concept, we discuss how to prevent illegal information flow to occur by performing conflicting transactions.\",\"PeriodicalId\":312802,\"journal\":{\"name\":\"2009 International Conference on Network-Based Information Systems\",\"volume\":\"8 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-08-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 International Conference on Network-Based Information Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NBiS.2009.58\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 International Conference on Network-Based Information Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NBiS.2009.58","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Evaluation of Purpose Mark Releasing Protocol for Purpose-based Marking (PM) Protocol
Information systems are required to be not only secure but also consistent in presence of security threats and multiple conflicting transactions. There are many discussions on each of the security and concurrency control. In this paper, we discuss a novel synchronization protocol to make an information system secure and consistent. In the role-based access control model, authorized access requests are specified in roles. A transaction issued by a subject is assigned with a subfamily of roles named purpose. Based on the purpose concept, we discuss how to prevent illegal information flow to occur by performing conflicting transactions.