The rising demand for real-time services over the netw ork such as w eb-based information services requires new approaches for balancing competing demands on limited resources. The BeeHive database system proposes a n o vel solution to this need by the use of adaptive real-time, fault tolerance, quality of service and security services based upon rules embedded in individual objects 1]. These rules prescribe tradeo s of alternate levels of service (and cost) when resource conten tion becomes a problem. The approach momentarily trades o the lev el of securit y t o a c hiev e a required real-time performance. In many situations this is an acceptable, and even preferred, solution. We h a ve d e v eloped an adaptable security manager to provide alternate levels of communications security t o m ultiple users and dynamically adapt to real-time performance conditions. In this paperwe present the design and evaluation of the proposed security manager that utilizes the notion of adaptable security services.
Several applications, such as web services and ecommerce, are
A system designer faces several challenges when specifying security for distributed computing environments or migrating systems to a new execution platform. Business stakeholders impose constraints due to cost, timeto-market requirements, productivity impact, customer satisfaction concerns, and the like. And users exercise power at the desktop over computing resources and data availability. So, a system designer needs to understand requirements regarding protected resources (e.g., data), confidentiality, and integrity. And, a designer needs to predict the effect that security measures will have on other runtime quality attributes such as resource consumption, availability, and real-time performance.After all, the resource costs associated with security can easily overload a system. Security processing can increase usage of processing power, bandwidth, battery (in embedded systems), and other resources. Despite that, security is often studied only in isolation and late in the process. However, using model-based engineering (MBE) tools, the Carnegie Mellon ® software Engineering Institute (SEI) has developed analytical techniques to model and validate security according to flow-based approaches and to represent standard security protocols such as Bell-LaPadula LaPadula 1973, 1976], Chinese wall [Brewer 1989; Lin 1989], role-based access control [Ferraiolo 1992], Biba model [Biba 1977] for enforcing confidentiality and integrity. Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. Report Documentation Page
Real-time applications such as e-commerce, flight control, chemical and nuclear control, and
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.