A Novel Project of Access Control of Multi-Level Security Firewall

Article Preview

Abstract:

This article aims at the defects in access control strategy of multi-level security firewall, and presents its security classification, scope and access rules for improved methods for the sake of enhancing the security of the firewall.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2035-2038

Citation:

Online since:

November 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] HectorGarcia-Molina, Jeffery D. Uiiman, The Implementation of Database System. Machinery Industry Press. (2001).

Google Scholar

[2] Bell D E, Leonard J L. Secure Computer System: Unified Expositionand MULTICS Interpretation. Bedford, MA, USA: The MitreCorporation, Tech. Rep.: MTR-2997, (1976).

Google Scholar

[3] Sushil Jajodia and Catherine Meadows, Inference Problems in Multilevel Secure Database Management Systems, Information Security, Essay 24.

Google Scholar

[4] Agrawal R, Evfimievski A, Srikant R. Information Sharing AcrossPrivate Databases. Proceedings of ACM SIGMOD InternationalConference on Management of Data, 2003-06: 86-97.

DOI: 10.1145/872757.872771

Google Scholar

[5] L. Cholvy and F. Cuppens. Providing Consistent Views in a Polyinstantiated Database. Eighth Annual Working Conference on Database Security, August (1994).

Google Scholar

[4] Z.Y. Feng. L.H. Yue. et al. The key Loophole Problem of the Existing Multilevel Secure Data Model and the Eliminating Method. Computer engineering and Applications, (2005).

Google Scholar

[7] Kantarcioglu M, Clifton C. Privacy-preserving Distributed Miningof Association Rules on Horizontally Partitioned Data. Proc. ofIEEE Transactions on Knowledge and Data Engineering, 2004-09: 1026-1037.

DOI: 10.1109/tkde.2004.45

Google Scholar