1,110,032 research outputs found

    A Design of MAC Model Based on the Separation of Duties and Data Coloring: DSDC-MAC

    Get PDF
    Among the access control methods for database security, there is Mandatory Access Control (MAC) model in which the security level is set to both the subject and the object to enhance the security control. Legacy MAC models have focused only on one thing, either confidentiality or integrity. Thus, it can cause collisions between security policies in supporting confidentiality and integrity simultaneously. In addition, they do not provide a granular security class policy of subjects and objects in terms of subjects\u27 roles or tasks. In this paper, we present the security policy of Bell_LaPadula Model (BLP) model and Biba model as one complemented policy. In addition, Duties Separation and Data Coloring (DSDC)-MAC model applying new data coloring security method is proposed to enable granular access control from the viewpoint of Segregation of Duty (SoD). The case study demonstrated that the proposed modeling work maintains the practicality through the design of Human Resources management System. The proposed model in this study is suitable for organizations like military forces or intelligence agencies where confidential information should be carefully handled. Furthermore, this model is expected to protect systems against malicious insiders and improve the confidentiality and integrity of data

    Chinese Wall Security Policy

    Get PDF
    This project establishes a Chinese wall security policy model in the environment of cloud computing. In 1988 Brewer and Nash proposed a very nice commercial security policy in British financial world. Though the policy was well accepted, but the model was incorrect. A decade later, Dr. Lin provided a model in 2003 that meets Brewer & Nash’s Policy. One of the important components in Cloud computing is data center. In order for any company to store data in the center, a trustable security policy model is a must; Chinese wall security policy model will provide this assurance. The heart of the Chinese Wall Security Policy Model is the concept of Conflict of Interest (COI). The concept can be modeled by an anti-reflexive, symmetric and transitive binary relation. In this project, by extending Dr. Lin’s Model, we explore the security issues in the environment of cloud computing and develop a small system of the Chinese Wall Security Model

    The Application of AHP Model to Guide Decision Makers: A Case Study of E-banking Security

    Full text link
    Changes in technology have resulted in new ways for bankers to deliver their services to costumers. Electronic banking systems in various forms are the evidence of such advancement. However, information security threats also evolving along this trend. This paper proposes the application of Analytic Hierarchy Process (AHP) methodology to guide decision makers in banking industries to deal with information security policy. The model is structured according aspects of information security policy in conjunction with information security elements. We found that cultural aspect is valued on the top priority among other security aspects, while confidentiality is considered as the most important factor in terms of information security elements.Comment: 5 page

    Enabling Water-Energy–Food Nexus: a New Approach for Sustainable Agriculture and Food Security in Mountainous Landlocked Countries

    Full text link
    Majority of landlocked mountainous countries are poorly ranked in Human Development Index (HDI), mostly due to poor per capita agriculture production, increasing population, unemployment, expensive and delayed transportation including several other factors. Generally, economy of such countries substantially relies on subsistence agriculture, tourism, hydropower and largely on remittance etc. Recently, it has been argued that to utilize scarce suitable land efficiently for food production, poor inland transport, hydropower, irrigation, drinking water in integration with other developmental infrastructures, an overarching policy linking water - energy – food nexus within a country for combating water, energy and food security would be most relevant. Thus, in present paper it has been opined that promotion of such linkage via nexus approach is the key to sustainable development of landlocked mountainous countries. Major land mass in mountainous countries like Nepal remains unsuitable for agriculture, road and other infrastructure profoundly imposing food, nutrition and energy security. However, large pristine snowy mountains function as wildlife sanctuaries, pastures, watershed, recharge areas for regional and global water, food and energy security. In return, landlocked mountainous countries are offered certain International leverages. For more judicious trade off, it is recommended that specific countries aerial coverage of mountains would be more appropriate basis for such leverages. Moreover, for sustainability of mountainous countries an integrated approach enabling water - energy – food nexus via watershed-hydropower-irrigation-aquaculture-agriculture-integrated linking policy model is proposed. This model would enable protection of watershed for pico, micro, and mega hydro power plants and tail waters to be used for aquaculture or irrigation or drinking water purposes for food and nutrition security

    Beyond Boundaries: A Promising New Model for Security and Global Development

    Get PDF
    In 2007, a team of international security experts and researchers at the Henry L. Stimson Center launched an initiative to build an effective model for sustainable nonproliferation of biological, chemical, and nuclear weapons. The project represented an exciting and innovative way of thinking about security: a "dual-use" approach that operated at the nexus of the security and development communities. The team's ingenuity paid off. After less than six years, the Stimson Center is phasing out its involvement in the successful program, which will now be government funded. This paper shows how a novel idea, supported with modest grants from Carnegie Corporation, went on to secure millions in support from international sources, achieving real-world policy wins

    PROPERTY RIGHTS, PRODUCTION TECHNOLOGY AND DEFORESTATION: COCOA IN WEST AFRICA

    Get PDF
    In this paper, we use a vintage-capital model with risk of eviction to assess cocoa farmers' response to changes in their tenure security and to the introduction of a new, faster-maturing cocoa variety. The model is calibrated with data from Cameroon in calendar year 2000, and then used to simulate the effects of institutional and technical change on farmer welfare and deforestation rates. Our findings can be summarized in three points. First, improved tenure security over cocoa fields increases farmers' consumption and welfare, but at the expense of more deforestation. Second, the introduction of new cocoa varieties with faster maturity and higher input response also unambiguously raises farmers' consumption and welfare. Doing so increases deforestation under insecure land tenure, but slows down deforestation under secure land tenure. Third, when introducing the two innovations together (more security and also new varieties), there is both an increase in welfare and a decline in deforestation. In sum, the availability of new cocoa cultivars calls for stronger tenure security, to accelerate investment and reduce deforestation.Resource /Energy Economics and Policy,

    A New Distributed Chinese Wall Security Policy Model

    Get PDF
    The application of the Chinese wall security policy model (CWSPM) to control the information flows between two or more competing and/or conflicting companies in cloud computing (Multi-tenancy) or in the social network, is a very interesting solution. The main goal of the Chinese Wall Security Policy is to build a wall between the datasets of competing companies, and among the system subjects. This is done by the applying to the subjects mandatory rules, in order to control the information flow caused between them. This problem is one of the hottest topics in the area of cloud computing (as a distributed system) and has been attempted in the past; however the proposed solutions cannot deal with the composite information flows problem (e.g., a malicious Trojan horses problem), caused by the writing access rule imposed to the subject on the objects. In this article, we propose a new CWSP model, based on the access query type of the subject to the objects using the concepts of the CWSP. We have two types of walls placement, the first type consists of walls that are built around the subject, and the second around the object. We cannot find inside each once wall two competing objects\u27 data. We showed that this mechanism is a good alternative to deal with some previous models\u27 limitations. The model is easy to implement in a distributed system (as Cloud-Computing). It is based on the technique of Object Oriented Programming (Can be used in Cloud computing Software as a service SaaS ) or by using the capabilities as an access control in real distributed system

    Dynamic deployment of context-aware access control policies for constrained security devices

    Get PDF
    Securing the access to a server, guaranteeing a certain level of protection over an encrypted communication channel, executing particular counter measures when attacks are detected are examples of security requirements. Such requirements are identi ed based on organizational purposes and expectations in terms of resource access and availability and also on system vulnerabilities and threats. All these requirements belong to the so-called security policy. Deploying the policy means enforcing, i.e., con guring, those security components and mechanisms so that the system behavior be nally the one speci ed by the policy. The deployment issue becomes more di cult as the growing organizational requirements and expectations generally leave behind the integration of new security functionalities in the information system: the information system will not always embed the necessary security functionalities for the proper deployment of contextual security requirements. To overcome this issue, our solution is based on a central entity approach which takes in charge unmanaged contextual requirements and dynamically redeploys the policy when context changes are detected by this central entity. We also present an improvement over the OrBAC (Organization-Based Access Control) model. Up to now, a controller based on a contextual OrBAC policy is passive, in the sense that it assumes policy evaluation triggered by access requests. Therefore, it does not allow reasoning about policy state evolution when actions occur. The modi cations introduced by our work overcome this limitation and provide a proactive version of the model by integrating concepts from action speci cation languages
    • …
    corecore