Study on Access Control Based on Trusted Computing

Article Preview

Abstract:

An important new technology has recently been developed that will revolutionize trust and security for online transactions. Conventionally, most of the security-relevant functions are concentrated within the operating system. Often, these functions, especially those dealing with access control, are commingled with object management functions. This article, abstracted from a new book on the subject, explains the key concepts and the exciting potential of Trusted Computing Platforms (often abbreviated to Trusted Platforms). We discuss access control in multilevel database management systems applies and illustrate the main applies of access control based on Trusted Computing in the LogicSQL database system.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

980-983

Citation:

Online since:

December 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Siani Pearson, Trusted Computing Platforms, the Next Security Solution. Trusted E-Services Laboratory of HP Laboratories Bristol, (2012).

Google Scholar

[2] Huang Yi, Ma xinqiang. A model of access control based on trusted computing, Journal of Chongqing University of Arts and Sciences, (2010), 29(3), pp.54-57.

Google Scholar

[3] L.Y. Yuan, The Documentation of Logic SQL. Alberta University Press, Canada. (2013), pp.1-15.

Google Scholar

[4] Li Danning, Li Qi, Ma Xinqiang. Research of security mechanisms based on LogicSQL database. 2nd International Conference on Mechanical Engineering and Green Manufacturing, MEGM (2012), pp.352-356.

Google Scholar

[5] D.E. Bell. Secure computer systems: A refinement of the mathematical model. Technical Report ESD-TR-278, vol. 3, The Mitre Corp., Bedford, MA, (1973).

Google Scholar

[6] K.J. Biba. Integrity considerations for secure computer systems. Technical Report TR-3153, The Mitre Corporation, Bedford, MA, (April 1977).

Google Scholar

[7] P. Samartini and S. D. Capitani di Vimercati. Access Control: Policies, Models, and Mechanisms. In Foundations of Security Analysis and Design: Tutorial Lectures, Lecture Notes in Computer Science, vol. 2171, pp.137-193, (2001).

DOI: 10.1007/3-540-45608-2_3

Google Scholar