Results 21 to 30 of about 13,471 (161)

Improving Security Incidents Detection for Networked Multilevel Intelligent Control Systems in Railway Transport

open access: yesTelfor Journal, 2016
Security monitoring and incident management systems have become the main research focus in the area of intelligent railway control systems. In this work, we discuss a system architecture of multilevel intelligent control system in Russian Railway ...
A. V. Chernov   +3 more
doaj   +1 more source

Remote Debugging Mechanism Based on MILS Multi-level Security Architecture [PDF]

open access: yesJisuanji gongcheng, 2016
Aiming at the features of multi-level security architecture,and the remote debugging technology based on the Multiple Independent Levels of Security(MILS) multilevel security architecture,this paper proposes a unified management and synergic debugging ...
LI Jian,CHEN Ge,YE Xiaoyun,FU Kai,HE Wei
doaj   +1 more source

Representation model of structured document for multilevel security

open access: yesTongxin xuebao, 2012
In order to solve the problem caused by the variety and openness of the network,the research for the models of structured document and access control were taken.A new structured document representation model and method for the security requirements of ...
Mang SU   +3 more
doaj   +2 more sources

Integrating Multilevel Security Policies in Multilevel Federated Database Systems [PDF]

open access: yes, 2002
This paper describes a multilevel security policies integration methodology to endow tightly coupled federated database systems with a multilevel security system. The proposal is based on a schema integration process. It obtains, in a semi-automatic form, the ordered set of classification levels for the multilevel security system of the federation, and
Marta Oliva, Fèlix Saltor
openaire   +1 more source

Joint security and performance improvement in multilevel shared caches

open access: yesIET Information Security, 2021
Multilevel cache architectures are widely used in modern heterogeneous systems for performance improvement. However, satisfying the performance and security requirements at the same time is a challenge for such systems.
Amin Sarihi   +4 more
doaj   +1 more source

Multilevel Security Protocol using RFID

open access: yesInternational Journal of Advanced Computer Science and Applications, 2011
Though RFID provides automatic object identification, yet it is vulnerable to various security threats that put consumer and organization privacy at stake. In this work, we have considered some existing security protocols of RFID system and analyzed the possible security threats at each level. We have modified those parts of protocol that have security
Syed Faiazuddin   +4 more
openaire   +1 more source

Enhancing Design and Authentication Performance Model: A Multilevel Secure Database Management System

open access: yesFuture Internet
Multilevel security (MLS) is particularly intended to secure information against unauthorized access. An MLS security DBMS allows users with different security levels to access and share a database.
Hemin Sardar Abdulla, Aso M. Aladdin
doaj   +1 more source

Differentiated approach to evaluating the level and state of multilevel indicators on the example of economic security of the enterprise

open access: yesЕкономіка, управління та адміністрування, 2020
The critical review of existing methods and approaches to assessing the level and state of economic security of the enterprise as one of the well-known multi-level indicators is carried out.
Ie.V. Mishchuk
doaj   +1 more source

Multilevel Secure Data Stream Processing [PDF]

open access: yes, 2011
With sensors and mobile devices becoming ubiquitous, situation monitoring applications are becoming a reality. Data Stream Management Systems (DSMSs) have been proposed to address the data processing needs of such applications that require collection of high-speed data, computing results on-the-fly, and taking actions in real-time.
Raman Adaikkalavan   +2 more
openaire   +1 more source

A Container-based Trusted Multi-level Security Mechanism

open access: yesITM Web of Conferences, 2017
Multi-level security mechanism has been widely applied in the military, government, defense and other domains in which information is required to be divided by security-level.
Li Xiao-Yong, Ji Chen, Liu Gang
doaj   +1 more source

Home - About - Disclaimer - Privacy