A System Architecture to Support a Verifiably Secure Multilevel Security System

Author(s):  
George I. Davida ◽  
Richard A. DeMillo ◽  
Richard J. Lipton
2011 ◽  
Vol 22 (5) ◽  
pp. 1020-1030
Author(s):  
Zhi YANG ◽  
Shu-Yuan JIN ◽  
Mi-Yi DUAN ◽  
Bin-Xing FANG

Author(s):  
Michael Finke ◽  
Peter de Waard ◽  
Pietro Recchilongo ◽  
Raoul Lahaije ◽  
Ulrike Baumann

Author(s):  
Santosh Kumar Sharma ◽  
Bonomali Khuntia

The entire world is running behind the smart technology to accomplish the daily needs in a smart way such as smart farming, smart irrigation system, smart transportation system, smart medical management, handling of smart home appliances, smart security, etc. Smart technology is the soul property of internet services and accessing data from virtual servers, which raises the alarm of security vulnerability and threats. In recommended system we have focused on application layer security which are concerned with application interface and queue manager for service exchange. As application layer is the closest to end user and produces the big threat to the application platform it motivates us to recommend strong multilevel security system to identify the different activity of handlers and identify their roles to enroute of accessing confidential data services. Subsequently, our work is to assure that every user should have an authentication key with specific privileges to get the desired information. In focus, we see the security management by integrating the Kerberos authentication protocol with honey encryption technique to provide strong multilevel security system.


Cash machines and bank cards are currently being used with the ultimate purpose of currency trades and agree a crucial operation in exchange. For eg, the shortcomings of the current validation scheme, the secret key and the Security code triggered a leakage of data put away in ATM payment card that resulted in the loss in cash in ledger and personal data misuse. In order to overcome this vulnerability of theft during cash transactions, it intend to use customers ' fingerprints as a hidden term included with once hidden expression. The consumer will have the right to carry on for exchange after accepted confirmation. Every individual's distinctive biometric label is one of its kind and unchangeable


2014 ◽  
Vol 602-605 ◽  
pp. 3404-3407
Author(s):  
Li Dan Feng

Cloud computing is the emerging industry that develops rapidly at present, with extensive development prospect; however, the challenge to security technology that it faces is unprecedented. In this paper, the author analyzed the technical characteristics of cloud computing and the security problem at present, put forward the idea to establish the information security system architecture of vertical stratification and horizontal integration from the multiple perspectives of security technology, security management specification and safety laws & regulations, etc..


2007 ◽  
Vol 7 (4) ◽  
pp. 483-494 ◽  
Author(s):  
P. Kitsos ◽  
N. Sklavos ◽  
O. Koufopavlou

Sign in / Sign up

Export Citation Format

Share Document