NO20071941L - Fremgangsmate og anordning for verifikasjon av informasjonstilgang i IKT-system med flere sikkerhetsdimensjoner og sikkerhetsniva. - Google Patents
Fremgangsmate og anordning for verifikasjon av informasjonstilgang i IKT-system med flere sikkerhetsdimensjoner og sikkerhetsniva.Info
- Publication number
- NO20071941L NO20071941L NO20071941A NO20071941A NO20071941L NO 20071941 L NO20071941 L NO 20071941L NO 20071941 A NO20071941 A NO 20071941A NO 20071941 A NO20071941 A NO 20071941A NO 20071941 L NO20071941 L NO 20071941L
- Authority
- NO
- Norway
- Prior art keywords
- security
- model
- verification
- access
- information
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/104—Grouping of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
Abstract
Vi beskriver en modell for flernivå informasjonssikkerhet.Et informasjonsobjekt tildeles et sikkerhetsmerke som angir sikkerhetsnivået langs et vilkårlig antall akser. Modellen er rollebasert. En rolle tildeles tilgangsmerke langs de samme aksene. Verifikasjon av en rolles tilgang til informasjon utføres ved å sammenligne tilgangsmerke med sikkerhetsmerke. Siden aspektene som representeres av hver akse er innbyrdes uavhengige, kan hver akse behandles for seg. Dette muliggjør en svært effektiv algoritme for verifikasjon av tilgang. Modellen vil derfor være velegnet i system med lav prosesseringskapasitet. Basert på denne modellen beskriver vi en fremgangsmåte og en anordning for å sikre konfidensialitet, integritet og tilgjengelighet for informasjon fra periferiutstyr i kommunikasjonsnett. Slikt periferiutstyr kan være, men er ikke begrenset til, personlige terminaler for redningsmannskaper, soldater osv, sensorer for røyk, gass, bevegelse, innbrudd osv.
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
NO20071941A NO326590B1 (no) | 2007-04-16 | 2007-04-16 | Fremgangsmate og anordning for verifikasjon av informasjonstilgang i IKT-system med flere sikkerhetsdimensjoner og sikkerhetsniva. |
PCT/NO2008/000135 WO2008127124A2 (en) | 2007-04-16 | 2008-04-15 | Method and apparatus for verification of information access in ict- systems having multiple security dimensions and multiple security levels |
EP08741726A EP2140658A2 (en) | 2007-04-16 | 2008-04-15 | Method and apparatus for verification of information access in ict- systems having multiple security dimensions and multiple security levels |
CA002684023A CA2684023A1 (en) | 2007-04-16 | 2008-04-15 | Method and apparatus for verification of information access in ict-systems having multiple security dimensions and multiple security levels |
US12/595,509 US20100049974A1 (en) | 2007-04-16 | 2008-04-15 | Method and apparatus for verification of information access in ict systems having multiple security dimensions and multiple security levels |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
NO20071941A NO326590B1 (no) | 2007-04-16 | 2007-04-16 | Fremgangsmate og anordning for verifikasjon av informasjonstilgang i IKT-system med flere sikkerhetsdimensjoner og sikkerhetsniva. |
Publications (2)
Publication Number | Publication Date |
---|---|
NO20071941L true NO20071941L (no) | 2008-10-17 |
NO326590B1 NO326590B1 (no) | 2009-01-19 |
Family
ID=39864481
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
NO20071941A NO326590B1 (no) | 2007-04-16 | 2007-04-16 | Fremgangsmate og anordning for verifikasjon av informasjonstilgang i IKT-system med flere sikkerhetsdimensjoner og sikkerhetsniva. |
Country Status (5)
Country | Link |
---|---|
US (1) | US20100049974A1 (no) |
EP (1) | EP2140658A2 (no) |
CA (1) | CA2684023A1 (no) |
NO (1) | NO326590B1 (no) |
WO (1) | WO2008127124A2 (no) |
Families Citing this family (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8825611B1 (en) * | 2010-01-12 | 2014-09-02 | Sandia Corporation | Policy enabled information sharing system |
NO335189B1 (no) | 2010-10-26 | 2014-10-20 | Cupp Computing As | Sikkert databehandlingssystem |
US9009779B2 (en) * | 2010-11-12 | 2015-04-14 | Content Watch, Inc. | Methods related to network access redirection and control and devices and systems utilizing such methods |
US10496834B2 (en) * | 2011-10-25 | 2019-12-03 | Cupp Computing As | Secure computing system |
US8898780B2 (en) * | 2011-11-07 | 2014-11-25 | Qualcomm Incorporated | Encoding labels in values to capture information flows |
CN104580069B (zh) * | 2013-10-12 | 2017-09-12 | 中国移动通信集团公司 | 一种基于nls负逻辑系统的安全防御方法、设备和系统 |
KR102125923B1 (ko) * | 2013-10-24 | 2020-06-24 | 삼성전자 주식회사 | 전자 장치의 운영체제 업그레이드 방법 및 장치 |
GB2520949A (en) | 2013-12-04 | 2015-06-10 | Ibm | Trustworthiness of processed data |
US20150222665A1 (en) * | 2014-01-31 | 2015-08-06 | Peter Eberlein | Restricting user actions based on document classification |
US10235176B2 (en) | 2015-12-17 | 2019-03-19 | The Charles Stark Draper Laboratory, Inc. | Techniques for metadata processing |
US10936713B2 (en) * | 2015-12-17 | 2021-03-02 | The Charles Stark Draper Laboratory, Inc. | Techniques for metadata processing |
CN105959322A (zh) * | 2016-07-13 | 2016-09-21 | 浪潮(北京)电子信息产业有限公司 | 一种基于多保护策略融合的强制访问控制方法及系统 |
US10355916B2 (en) * | 2016-09-27 | 2019-07-16 | Mcafee, Llc | Survivable networks that use opportunistic devices to offload services |
US20210042100A1 (en) | 2018-02-02 | 2021-02-11 | Dover Microsystems, Inc. | System and method for translating mapping policy into code |
EP3746925A1 (en) | 2018-02-02 | 2020-12-09 | The Charles Stark Draper Laboratory Inc. | Systems and methods for policy execution processing |
EP3788488A1 (en) | 2018-04-30 | 2021-03-10 | Dover Microsystems, Inc. | Systems and methods for checking safety properties |
TW202022679A (zh) | 2018-11-06 | 2020-06-16 | 美商多佛微系統公司 | 用於停滯主處理器的系統和方法 |
US11841956B2 (en) | 2018-12-18 | 2023-12-12 | Dover Microsystems, Inc. | Systems and methods for data lifecycle protection |
CN111671399B (zh) * | 2020-06-18 | 2021-04-27 | 清华大学 | 噪声感知强度的测量方法、装置和电子设备 |
CN112738114B (zh) * | 2020-12-31 | 2023-04-07 | 四川新网银行股份有限公司 | 一种网络安全策略的配置方法 |
CN114205122A (zh) * | 2021-11-17 | 2022-03-18 | 南方电网数字电网研究院有限公司 | 一种基于ai的电网网络数据安全测试系统及方法 |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6023765A (en) | 1996-12-06 | 2000-02-08 | The United States Of America As Represented By The Secretary Of Commerce | Implementation of role-based access control in multi-level secure systems |
US7669051B2 (en) * | 2000-11-13 | 2010-02-23 | DigitalDoors, Inc. | Data security system and method with multiple independent levels of security |
US20030196108A1 (en) * | 2002-04-12 | 2003-10-16 | Kung Kenneth C. | System and techniques to bind information objects to security labels |
US7536548B1 (en) * | 2002-06-04 | 2009-05-19 | Rockwell Automation Technologies, Inc. | System and methodology providing multi-tier-security for network data exchange with industrial control components |
US7441264B2 (en) * | 2002-06-24 | 2008-10-21 | International Business Machines Corporation | Security objects controlling access to resources |
US7577838B1 (en) * | 2002-12-20 | 2009-08-18 | Alain Rossmann | Hybrid systems for securing digital assets |
US7503067B2 (en) * | 2004-02-02 | 2009-03-10 | Toshiba Corporation | Preset security levels |
CA2459004A1 (en) * | 2004-02-20 | 2005-08-20 | Ibm Canada Limited - Ibm Canada Limitee | Method and system to control data acces using security label components |
US20070156691A1 (en) * | 2006-01-05 | 2007-07-05 | Microsoft Corporation | Management of user access to objects |
-
2007
- 2007-04-16 NO NO20071941A patent/NO326590B1/no not_active IP Right Cessation
-
2008
- 2008-04-15 EP EP08741726A patent/EP2140658A2/en not_active Withdrawn
- 2008-04-15 US US12/595,509 patent/US20100049974A1/en not_active Abandoned
- 2008-04-15 CA CA002684023A patent/CA2684023A1/en not_active Abandoned
- 2008-04-15 WO PCT/NO2008/000135 patent/WO2008127124A2/en active Application Filing
Also Published As
Publication number | Publication date |
---|---|
WO2008127124A3 (en) | 2009-03-19 |
US20100049974A1 (en) | 2010-02-25 |
EP2140658A2 (en) | 2010-01-06 |
CA2684023A1 (en) | 2008-10-23 |
NO326590B1 (no) | 2009-01-19 |
WO2008127124A2 (en) | 2008-10-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
NO20071941L (no) | Fremgangsmate og anordning for verifikasjon av informasjonstilgang i IKT-system med flere sikkerhetsdimensjoner og sikkerhetsniva. | |
Cao et al. | Birds and people both depend on China's wetlands | |
MY166564A (en) | A system and method for privacy management for internet of things services | |
TW200636586A (en) | System security approaches using multiple processing units | |
Alazzam et al. | Federated deep learning approaches for the privacy and security of IoT systems | |
US20210014205A1 (en) | Systems and methods for securing information | |
Holt et al. | Examining state and local law enforcement perceptions of computer crime | |
Ahmed et al. | Approaches to federated computing for the protection of patient privacy and security using medical applications | |
Tonhauser et al. | Disruptive acts in cyberspace, steps to improve cyber resilience at National Level | |
Montasari | Countering cyberterrorism: the confluence of artificial intelligence, cyber forensics and digital policing in US and UK national cybersecurity | |
Wendzel et al. | Steganography for Cyber Physical Systems | |
Mishra et al. | HCI based in-cabin monitoring system for irregular situations with occupants facial anonymization | |
Naik et al. | Secure Complaint bot using Onion Routing Algorithm Concealing identities to increase effectiveness of complain bot | |
Nosál | Crime in the Digital Age: A New Frontier | |
Jahankhani et al. | Global Security, Safety and Sustainability: The Security Challenges of the Connected World: 11th International Conference, ICGS3 2017, London, UK, January 18-20, 2017, Proceedings | |
Sanderson | Adaptation strategies for self-organising electronic institutions | |
Chen et al. | Closeness Based New Word Detection Method for Mechanical Design and Manufacturing Area | |
Cebula et al. | Public choice and the EPA, 20 years later: An exploratory study | |
Ahmed et al. | Research Article Approaches to Federated Computing for the Protection of Patient Privacy and Security Using Medical Applications | |
Urquhart et al. | Assessing Information Security Regulations for Domestic and Industrial Cyber-Physical Systems | |
AGGARWAL et al. | IOT Based Privacy Preserving Machine Learning Algorithm for High-Speed Encryption | |
Martinez | Random Walk Metropolis Sampler | |
Siiskonen | Practical Method for Understanding Resilience and Quality of Data Integrity in Embedded Systems | |
Alazzam et al. | Research Article Federated Deep Learning Approaches for the Privacy and Security of IoT Systems | |
Mihunov et al. | Fairness and Explainability of Random Forest Regression in Predicting Social Media Rescue Requests with Socio-Environmental Features: Case of Hurricane Harvey |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
MM1K | Lapsed by not paying the annual fees |