Design of Secure CAMIN Application System Based on Dependable and Secure TMO and RT-UCON


Increasingly the need for protecting information from unauthorized access has lead to more attention in the field of information security. Access control mechanisms have been in place for the last four decades and are a powerful tool utilized to ensure security. In a real-time distributed computing environment, systems have to meet timing constraints for time sensitive applications, such as obtaining financial quotes and operating command and control systems. However, real-time distributed computing environment security is yet to be investigated. Earlier work examined a Time Triggered Message Triggered Object (TMO) scheme that provides real-time services in a distributed computing environment secured by applying a Role-Based Access Control (RBAC). In this paper we describe the application of a sophisticated Usage Control (UCON) model for a TMO and subsequently design an application that utilizes a Coordinated Anti-Missile Interceptor Network (CAMIN) system. This application is a secure CAMIN based upon a secure TMO that applies a Real Time UCON (RT-UCON) in the CAMIN environment

DOI: 10.1109/ISORC.2007.28

Extracted Key Phrases

8 Figures and Tables

Cite this paper

@article{Kim2007DesignOS, title={Design of Secure CAMIN Application System Based on Dependable and Secure TMO and RT-UCON}, author={Jungin Kim and Bhavani M. Thuraisingham}, journal={10th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC'07)}, year={2007}, pages={146-155} }