By Topic

Evaluation of Purpose Mark Releasing Protocol for Purpose-based Marking (PM) Protocol

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Enokido, T. ; Rissho Univ., Japan ; Takizawa, M.

Information systems are required to be not only secure but also consistent in presence of security threats and multiple conflicting transactions. There are many discussions on each of the security and concurrency control. In this paper, we discuss a novel synchronization protocol to make an information system secure and consistent. In the role-based access control model, authorized access requests are specified in roles. A transaction issued by a subject is assigned with a subfamily of roles named purpose. Based on the purpose concept, we discuss how to prevent illegal information flow to occur by performing conflicting transactions in a serializable way.

Published in:

Network-Based Information Systems, 2009. NBIS '09. International Conference on

Date of Conference:

19-21 Aug. 2009