語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
External Labeling as a Framework for...
~
Rozenbroek, Thomas H.
FindBook
Google Book
Amazon
博客來
External Labeling as a Framework for Access Control.
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
External Labeling as a Framework for Access Control./
作者:
Rozenbroek, Thomas H.
面頁冊數:
277 p.
附註:
Source: Dissertation Abstracts International, Volume: 73-10(E), Section: A.
Contained By:
Dissertation Abstracts International73-10A(E).
標題:
Information Science. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3515283
ISBN:
9781267388032
External Labeling as a Framework for Access Control.
Rozenbroek, Thomas H.
External Labeling as a Framework for Access Control.
- 277 p.
Source: Dissertation Abstracts International, Volume: 73-10(E), Section: A.
Thesis (Ph.D.)--George Mason University, 2012.
With the ever increasing volume of data existing on and passing through on-line resources together with a growing number of legitimate users of that information and potential adversaries, the need for better security and safeguards is immediate and critical. Currently, most of the security and safeguards afforded on-line information are provided externally by the infrastructure and are based on security information that is also maintained by that infrastructure. As the infrastructure increases in size and interconnection, the more insecure the movement of information throughout the infrastructure becomes. The interconnection of different infrastructures means that there is a need for greater need for coordination between the infrastructures. Unfortunately, this is not always possible.
ISBN: 9781267388032Subjects--Topical Terms:
1017528
Information Science.
External Labeling as a Framework for Access Control.
LDR
:05044nam a2200313 4500
001
1958447
005
20140421080354.5
008
150210s2012 ||||||||||||||||| ||eng d
020
$a
9781267388032
035
$a
(MiAaPQ)AAI3515283
035
$a
AAI3515283
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Rozenbroek, Thomas H.
$3
2093537
245
1 0
$a
External Labeling as a Framework for Access Control.
300
$a
277 p.
500
$a
Source: Dissertation Abstracts International, Volume: 73-10(E), Section: A.
500
$a
Adviser: Edgar Sibley.
502
$a
Thesis (Ph.D.)--George Mason University, 2012.
520
$a
With the ever increasing volume of data existing on and passing through on-line resources together with a growing number of legitimate users of that information and potential adversaries, the need for better security and safeguards is immediate and critical. Currently, most of the security and safeguards afforded on-line information are provided externally by the infrastructure and are based on security information that is also maintained by that infrastructure. As the infrastructure increases in size and interconnection, the more insecure the movement of information throughout the infrastructure becomes. The interconnection of different infrastructures means that there is a need for greater need for coordination between the infrastructures. Unfortunately, this is not always possible.
520
$a
An alternative to strict reliance on the infrastructure is to include security attributes along with the objects that need to be secured. It is possible to improve the security of this information by attaching the external security labels to these objects. These external labels, which contain the required security information, are transferred as an integral part of the object's migration throughout the infrastructure. This dissertation presents a framework for using external labels that will provide better safeguards for securing information. This framework is object based and as such is applicable to anything, virtual or real-world, that can be represented or treated as 'an object'. It discusses how each entity within the infrastructure must be labeled to support the increase in security as well as provide the framework for assessing the user and system labels against those of the information objects.
520
$a
This dissertation presents and details the key features of the labeling solutions and explains the reasons why each of the features is necessary for the labeling framework to secure objects. The framework is based on securely attaching labels to the objects, while still allowing for the separation of the labels from the object. This separation must take place without the lessening the security afforded the objects. The second feature of the framework is the treatment of the object labels, themselves. The framework applies labels to the objects being protected, the users requesting access to the objects, and the end user and intermediate systems handling the objects. This provides for better management of the environment and therefore greater security for the objects. The final key feature of the framework is abstract nature of the objects and their labels. This framework places no limitation on either the objects being secured or the content of the labels. Any information that can be treated as an object can be handled by this framework. Also, any rules that can be modeled can be supported by the framework. This framework as proposed by this dissertation includes several types of labels that can be used to secure objects. This types of labels presented can be easily extended to meet the unique needs of the infrastructure without lessening the framework, itself.
520
$a
Additionally, this dissertation extends the use of labels to address security problems beyond simple access control. It demonstrates how object labeling can be used to secure multiple objects in a confederated manner, rather than as individual objects. Information is no longer being processed in small collections, but rather as large collections of information gathered from numerous sources. This framework is able to be managed these large collections in an effective manner. Further extensions include using labels to handle data aggregation and the avoidance of sensitivity escalation. Having access to larger collections increases the risk that too much information can be collocated or accessed at the same time. This dissertation presents tools and techniques for using the framework to minimize and control how information is aggregated in order to reduce these risks. Also, the framework can be used to insure that information aggregates don't result in the creation of information set which are "more" sensitive than the original information.
590
$a
School code: 0883.
650
4
$a
Information Science.
$3
1017528
650
4
$a
Information Technology.
$3
1030799
690
$a
0723
690
$a
0489
710
2
$a
George Mason University.
$3
1019450
773
0
$t
Dissertation Abstracts International
$g
73-10A(E).
790
$a
0883
791
$a
Ph.D.
792
$a
2012
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3515283
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9253275
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入