Security Interoperation of Network Management Systems using Role Lattices


The Transactions of the Korea Information Processing Society (1994 ~ 2000), Vol. 3, No. 7, pp. 1822-1833, Dec. 1996
10.3745/KIPSTE.1996.3.7.1822,   PDF Download:

Abstract

As the size complexity of networks increase, it is difficult to manage the whole network using single network manger, thus it is more reasonable to manage the network using several network managers distributed on the network. Security interoperability should be supported among network management system(NMSs) that use different management polocies. In this paper, an algorithm that makes it possible to take a role into a role lattices is suggested to provide security interoperability among NMSs that have their own role lattices. In addition, security constraints are proposed to maintain the confidentiality and integrity of information by dynamically modifying the access rights of roles as the state of a system changes. Also, the security constraints are expressed using ECA rules in this paper.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from September 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
S. J. Hyeon, K. T. Yeon, N. B. Nam, "Security Interoperation of Network Management Systems using Role Lattices," The Transactions of the Korea Information Processing Society (1994 ~ 2000), vol. 3, no. 7, pp. 1822-1833, 1996. DOI: 10.3745/KIPSTE.1996.3.7.1822.

[ACM Style]
Seo Jae Hyeon, Kim Tae Yeon, and Noh Bong Nam. 1996. Security Interoperation of Network Management Systems using Role Lattices. The Transactions of the Korea Information Processing Society (1994 ~ 2000), 3, 7, (1996), 1822-1833. DOI: 10.3745/KIPSTE.1996.3.7.1822.