Przedstawiono sposób zapewnienia cyberbezpieczeństwa na poziomie przekaźników zabezpieczeniowych, sposoby ochrony przed nieautoryzowanym dostępem do urządzeń lub błędami pracowników oraz przywołano użyteczne w tym zakresie normy, publikacje i grupy robocze.
EN
The article presents, how to ensure cyber-security in world of protection relays, ways of protection against unauthorized access to facilities or staff errors and useful standards, publications and working groups.
Interconnectivity of computers in network environments increases the risk of security breach in distributed computer systems. In many system architectures security is provided only in application space. This paper proposes an operating system enforced access control policy where Role Based Access Control and Privilege Management Infrastructure(PMI) based on X.509 attribute certificates are integrated into the operating system kernel. The resulting architecture tries to leverage the cost of maintaining the security policy by providing an easy way for managing security role assignments to users of the system.
3
Dostęp do pełnego tekstu na zewnętrznej witrynie WWW
The paper presents a short overview of the foundations of the Role-Based Access Control Modal Model and its properties. In particular, the translation of these model formulae to the first-order logic formulae in a form of Horn's clauses is analysed. The automation of processes and mechanisms related to access control on the basis of logical automated reasoning and the PROLOG language are described.
4
Dostęp do pełnego tekstu na zewnętrznej witrynie WWW
The role-based access control (RBAC) model is one of the policies used to access control in the information systems. This powerful technology is very useful for managing the security of the information systems of the enterprises. In order to utilise its potential, the roles - the main component of this model - have to be properly constructed to reflect the organisational access control policy and the needs of the system. This requires the development of the components of the RBAC model in the correct way and implementation with the use of suitable tools. This paper presents the extension of the standard RBAC model and the implementation of this extension. The proposed approach is realised using the Unified Modelling Language (UML). The UML language was chosen because nowadays it is the standard tool, properly reflecting the description of the information system and its needs.
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.