To obtain access to full text of journal and articles you must register!
- Article name
- Network objects access rights control implementation
- Authors
- Shcheglov K. A., , , St.-Petersburg State University of Information Technology, Mechanics and Optics, St.-Petersburg, Russia
Shcheglov A. Yu., , info@npp-itb.spb.ru, St.-Petersburg State University of Information Technology, Mechanics and Optics, St.-Petersburg, Russia
- Keywords
- information security / unauthorized access / access subject / access control / network object / access policy / filtering / firewall / network packet
- Year
- 2015 Issue 2 Pages 19 - 27
- Code EDN
- Code DOI
- Abstract
- This article reviews network objects access rights control implementation problems. Security complex (which must prevent information unauthorized access) requirements are set, including architectural requirements of two drivers presence (inside designed security complex) which are working on TCP/IP and NDIS levels of operating system. We show that network objects access rights control implementation must be treated as a component of the overall resource access policy implementation problem, which defines need of access subject identity via "user-process" essence. We formulate identity and specification requirements of network access object as a hierarchical object. We illustrate the big difference between network objects access rights control problem and network firewall problem. Network objects access rights control implementation is illustrated with implemented and proven technical solution.
- Text
- To obtain access to full text of journal and articles you must register!
- Buy