NO20071941L - Fremgangsmate og anordning for verifikasjon av informasjonstilgang i IKT-system med flere sikkerhetsdimensjoner og sikkerhetsniva. - Google Patents

Fremgangsmate og anordning for verifikasjon av informasjonstilgang i IKT-system med flere sikkerhetsdimensjoner og sikkerhetsniva.

Info

Publication number
NO20071941L
NO20071941L NO20071941A NO20071941A NO20071941L NO 20071941 L NO20071941 L NO 20071941L NO 20071941 A NO20071941 A NO 20071941A NO 20071941 A NO20071941 A NO 20071941A NO 20071941 L NO20071941 L NO 20071941L
Authority
NO
Norway
Prior art keywords
security
model
verification
access
information
Prior art date
Application number
NO20071941A
Other languages
English (en)
Other versions
NO326590B1 (no
Inventor
Eli Winjum
Bjorn Kjetil Molmann
Original Assignee
Kubekit As
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Kubekit As filed Critical Kubekit As
Priority to NO20071941A priority Critical patent/NO326590B1/no
Priority to PCT/NO2008/000135 priority patent/WO2008127124A2/en
Priority to EP08741726A priority patent/EP2140658A2/en
Priority to CA002684023A priority patent/CA2684023A1/en
Priority to US12/595,509 priority patent/US20100049974A1/en
Publication of NO20071941L publication Critical patent/NO20071941L/no
Publication of NO326590B1 publication Critical patent/NO326590B1/no

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/104Grouping of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

Abstract

Vi beskriver en modell for flernivå informasjonssikkerhet.Et informasjonsobjekt tildeles et sikkerhetsmerke som angir sikkerhetsnivået langs et vilkårlig antall akser. Modellen er rollebasert. En rolle tildeles tilgangsmerke langs de samme aksene. Verifikasjon av en rolles tilgang til informasjon utføres ved å sammenligne tilgangsmerke med sikkerhetsmerke. Siden aspektene som representeres av hver akse er innbyrdes uavhengige, kan hver akse behandles for seg. Dette muliggjør en svært effektiv algoritme for verifikasjon av tilgang. Modellen vil derfor være velegnet i system med lav prosesseringskapasitet. Basert på denne modellen beskriver vi en fremgangsmåte og en anordning for å sikre konfidensialitet, integritet og tilgjengelighet for informasjon fra periferiutstyr i kommunikasjonsnett. Slikt periferiutstyr kan være, men er ikke begrenset til, personlige terminaler for redningsmannskaper, soldater osv, sensorer for røyk, gass, bevegelse, innbrudd osv.
NO20071941A 2007-04-16 2007-04-16 Fremgangsmate og anordning for verifikasjon av informasjonstilgang i IKT-system med flere sikkerhetsdimensjoner og sikkerhetsniva. NO326590B1 (no)

Priority Applications (5)

Application Number Priority Date Filing Date Title
NO20071941A NO326590B1 (no) 2007-04-16 2007-04-16 Fremgangsmate og anordning for verifikasjon av informasjonstilgang i IKT-system med flere sikkerhetsdimensjoner og sikkerhetsniva.
PCT/NO2008/000135 WO2008127124A2 (en) 2007-04-16 2008-04-15 Method and apparatus for verification of information access in ict- systems having multiple security dimensions and multiple security levels
EP08741726A EP2140658A2 (en) 2007-04-16 2008-04-15 Method and apparatus for verification of information access in ict- systems having multiple security dimensions and multiple security levels
CA002684023A CA2684023A1 (en) 2007-04-16 2008-04-15 Method and apparatus for verification of information access in ict-systems having multiple security dimensions and multiple security levels
US12/595,509 US20100049974A1 (en) 2007-04-16 2008-04-15 Method and apparatus for verification of information access in ict systems having multiple security dimensions and multiple security levels

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
NO20071941A NO326590B1 (no) 2007-04-16 2007-04-16 Fremgangsmate og anordning for verifikasjon av informasjonstilgang i IKT-system med flere sikkerhetsdimensjoner og sikkerhetsniva.

Publications (2)

Publication Number Publication Date
NO20071941L true NO20071941L (no) 2008-10-17
NO326590B1 NO326590B1 (no) 2009-01-19

Family

ID=39864481

Family Applications (1)

Application Number Title Priority Date Filing Date
NO20071941A NO326590B1 (no) 2007-04-16 2007-04-16 Fremgangsmate og anordning for verifikasjon av informasjonstilgang i IKT-system med flere sikkerhetsdimensjoner og sikkerhetsniva.

Country Status (5)

Country Link
US (1) US20100049974A1 (no)
EP (1) EP2140658A2 (no)
CA (1) CA2684023A1 (no)
NO (1) NO326590B1 (no)
WO (1) WO2008127124A2 (no)

Families Citing this family (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8825611B1 (en) * 2010-01-12 2014-09-02 Sandia Corporation Policy enabled information sharing system
NO335189B1 (no) 2010-10-26 2014-10-20 Cupp Computing As Sikkert databehandlingssystem
US9009779B2 (en) * 2010-11-12 2015-04-14 Content Watch, Inc. Methods related to network access redirection and control and devices and systems utilizing such methods
US10496834B2 (en) * 2011-10-25 2019-12-03 Cupp Computing As Secure computing system
US8898780B2 (en) * 2011-11-07 2014-11-25 Qualcomm Incorporated Encoding labels in values to capture information flows
CN104580069B (zh) * 2013-10-12 2017-09-12 中国移动通信集团公司 一种基于nls负逻辑系统的安全防御方法、设备和系统
KR102125923B1 (ko) * 2013-10-24 2020-06-24 삼성전자 주식회사 전자 장치의 운영체제 업그레이드 방법 및 장치
GB2520949A (en) 2013-12-04 2015-06-10 Ibm Trustworthiness of processed data
US20150222665A1 (en) * 2014-01-31 2015-08-06 Peter Eberlein Restricting user actions based on document classification
US10235176B2 (en) 2015-12-17 2019-03-19 The Charles Stark Draper Laboratory, Inc. Techniques for metadata processing
US10936713B2 (en) * 2015-12-17 2021-03-02 The Charles Stark Draper Laboratory, Inc. Techniques for metadata processing
CN105959322A (zh) * 2016-07-13 2016-09-21 浪潮(北京)电子信息产业有限公司 一种基于多保护策略融合的强制访问控制方法及系统
US10355916B2 (en) * 2016-09-27 2019-07-16 Mcafee, Llc Survivable networks that use opportunistic devices to offload services
US20210042100A1 (en) 2018-02-02 2021-02-11 Dover Microsystems, Inc. System and method for translating mapping policy into code
EP3746925A1 (en) 2018-02-02 2020-12-09 The Charles Stark Draper Laboratory Inc. Systems and methods for policy execution processing
EP3788488A1 (en) 2018-04-30 2021-03-10 Dover Microsystems, Inc. Systems and methods for checking safety properties
TW202022679A (zh) 2018-11-06 2020-06-16 美商多佛微系統公司 用於停滯主處理器的系統和方法
US11841956B2 (en) 2018-12-18 2023-12-12 Dover Microsystems, Inc. Systems and methods for data lifecycle protection
CN111671399B (zh) * 2020-06-18 2021-04-27 清华大学 噪声感知强度的测量方法、装置和电子设备
CN112738114B (zh) * 2020-12-31 2023-04-07 四川新网银行股份有限公司 一种网络安全策略的配置方法
CN114205122A (zh) * 2021-11-17 2022-03-18 南方电网数字电网研究院有限公司 一种基于ai的电网网络数据安全测试系统及方法

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6023765A (en) 1996-12-06 2000-02-08 The United States Of America As Represented By The Secretary Of Commerce Implementation of role-based access control in multi-level secure systems
US7669051B2 (en) * 2000-11-13 2010-02-23 DigitalDoors, Inc. Data security system and method with multiple independent levels of security
US20030196108A1 (en) * 2002-04-12 2003-10-16 Kung Kenneth C. System and techniques to bind information objects to security labels
US7536548B1 (en) * 2002-06-04 2009-05-19 Rockwell Automation Technologies, Inc. System and methodology providing multi-tier-security for network data exchange with industrial control components
US7441264B2 (en) * 2002-06-24 2008-10-21 International Business Machines Corporation Security objects controlling access to resources
US7577838B1 (en) * 2002-12-20 2009-08-18 Alain Rossmann Hybrid systems for securing digital assets
US7503067B2 (en) * 2004-02-02 2009-03-10 Toshiba Corporation Preset security levels
CA2459004A1 (en) * 2004-02-20 2005-08-20 Ibm Canada Limited - Ibm Canada Limitee Method and system to control data acces using security label components
US20070156691A1 (en) * 2006-01-05 2007-07-05 Microsoft Corporation Management of user access to objects

Also Published As

Publication number Publication date
WO2008127124A3 (en) 2009-03-19
US20100049974A1 (en) 2010-02-25
EP2140658A2 (en) 2010-01-06
CA2684023A1 (en) 2008-10-23
NO326590B1 (no) 2009-01-19
WO2008127124A2 (en) 2008-10-23

Similar Documents

Publication Publication Date Title
NO20071941L (no) Fremgangsmate og anordning for verifikasjon av informasjonstilgang i IKT-system med flere sikkerhetsdimensjoner og sikkerhetsniva.
Cao et al. Birds and people both depend on China's wetlands
MY166564A (en) A system and method for privacy management for internet of things services
TW200636586A (en) System security approaches using multiple processing units
Alazzam et al. Federated deep learning approaches for the privacy and security of IoT systems
US20210014205A1 (en) Systems and methods for securing information
Holt et al. Examining state and local law enforcement perceptions of computer crime
Ahmed et al. Approaches to federated computing for the protection of patient privacy and security using medical applications
Tonhauser et al. Disruptive acts in cyberspace, steps to improve cyber resilience at National Level
Montasari Countering cyberterrorism: the confluence of artificial intelligence, cyber forensics and digital policing in US and UK national cybersecurity
Wendzel et al. Steganography for Cyber Physical Systems
Mishra et al. HCI based in-cabin monitoring system for irregular situations with occupants facial anonymization
Naik et al. Secure Complaint bot using Onion Routing Algorithm Concealing identities to increase effectiveness of complain bot
Nosál Crime in the Digital Age: A New Frontier
Jahankhani et al. Global Security, Safety and Sustainability: The Security Challenges of the Connected World: 11th International Conference, ICGS3 2017, London, UK, January 18-20, 2017, Proceedings
Sanderson Adaptation strategies for self-organising electronic institutions
Chen et al. Closeness Based New Word Detection Method for Mechanical Design and Manufacturing Area
Cebula et al. Public choice and the EPA, 20 years later: An exploratory study
Ahmed et al. Research Article Approaches to Federated Computing for the Protection of Patient Privacy and Security Using Medical Applications
Urquhart et al. Assessing Information Security Regulations for Domestic and Industrial Cyber-Physical Systems
AGGARWAL et al. IOT Based Privacy Preserving Machine Learning Algorithm for High-Speed Encryption
Martinez Random Walk Metropolis Sampler
Siiskonen Practical Method for Understanding Resilience and Quality of Data Integrity in Embedded Systems
Alazzam et al. Research Article Federated Deep Learning Approaches for the Privacy and Security of IoT Systems
Mihunov et al. Fairness and Explainability of Random Forest Regression in Predicting Social Media Rescue Requests with Socio-Environmental Features: Case of Hurricane Harvey

Legal Events

Date Code Title Description
MM1K Lapsed by not paying the annual fees