Dependable and secure TMO scheme


In a real-time distributed computing environment, security is critical to protect the system from unauthorized access especially since such systems are being used in time critical applications. Access control mechanisms have been introduced during the last several decades and have offered a basic and powerful means for enforcing security. In this paper, we examine the concepts of the TMO (time triggered message triggered object) scheme that provides guaranteed real-time services in a distributed object computing environment. We also examine access control mechanisms; such as the traditional model, the RBAC (role-based access control) model and the UCON (usage control) model. The main contribution of this paper is applying the traditional, RBAC and UCON models to the TMO scheme in order to provide a secure real-time distributed environment

DOI: 10.1109/ISORC.2006.27

Extracted Key Phrases

5 Figures and Tables

Cite this paper

@article{Kim2006DependableAS, title={Dependable and secure TMO scheme}, author={Jungin Kim and Bhavani M. Thuraisingham}, journal={Ninth IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC'06)}, year={2006}, pages={8 pp.-} }