Please use this identifier to cite or link to this item:
Researcher: Duraipangian, N
Guide(s): Chellappan, C
Keywords: ask based access control (TBAC)
classification schemes
Computer networks
control models
discretionary access control (DAC)
mandatory access control (MAC)
Upload Date: 27-Mar-2014
University: Anna University
Completed Date: n.g.
Abstract: Computer networks are increasingly being used by organizations to newlineeliminate the use of paper in their offices. Along with this increased usage of newlinecomputers comes the problem of protecting information. Protecting newlineinformation is of paramount importance to an organization s progress, and in newlinesome cases, its survival too. newlineThere is a strong need for developing new methodologies for a newlinesecure information system in organizations; in particular, new access control newlinemodels or extending the existing ones to neutralize security threats and newlineaddress the diverse security requirements of organizations. newlineSeveral models have been proposed to address the access control newlinerequirements. Traditional access control models are broadly categorized as newlinediscretionary access control (DAC) and mandatory access control (MAC) newlinemodels. New models such as role-based access control (RBAC), Context newlinebased access control (CBAC) or task based access control (TBAC) models newlinehave been proposed to address these security requirements. All these models newlineare not able to address the problem of insider threats. In this thesis this issue is newlineaddressed by dynamic reclassification of information security levels. newlineThe use of data classification schemes to secure confidential and newlineprivate information has been in use for a long time. The importance of newlineinformation changing over time is seen in many real world situations. For newlineexample, in an organization users are shifted from one domain to another, and newlineone project to other. Many new projects are added and previous ones are newlinecompleted and shelved. In all these cases, proper information access newlineclassification is to be ensured to prevent unauthorized access. In the existing newlineinformation security models information classification is static and it is not newlinesufficient in the current scenario where dynamic classification is needed. For newlinethis dynamic update, criteria such as file usage profile and organization newlinespecific data are used. newlineAnother important issue is managing the delegation in the digital newlineinformation management. newline newline
Pagination: 136
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File12.15 kBAdobe PDFView/Open
02_certificate.pdf6.08 kBAdobe PDFView/Open
03_abstract.pdf14.79 kBAdobe PDFView/Open
04_acknowledgement.pdf7.11 kBAdobe PDFView/Open
05_contents.pdf26.57 kBAdobe PDFView/Open
06_chapter1.pdf46.19 kBAdobe PDFView/Open
07_chapter2.pdf106.84 kBAdobe PDFView/Open
08_chapter3.pdf67.32 kBAdobe PDFView/Open
09_chapter4.pdf122.58 kBAdobe PDFView/Open
10_chapter5.pdf140.93 kBAdobe PDFView/Open
11_chapter6.pdf135.45 kBAdobe PDFView/Open
12_chapter7.pdf147.09 kBAdobe PDFView/Open
13_chapter8.pdf9.37 kBAdobe PDFView/Open
14_references.pdf53.6 kBAdobe PDFView/Open
15_publications.pdf8.14 kBAdobe PDFView/Open
16_vitae.pdf5.25 kBAdobe PDFView/Open

Items in Shodhganga are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: