Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.
This report shall discuss the threats to information and services in open systems. In it we shall provide an illustration where these threats are confronted, describe the three basic techniques of authentication, and comment on the various methods of access control. We go on to explain information compartmentalization, information disclosure policies, preventing the unauthorized modification of data, and audit logs. Finally we outline a hybrid approach for access control that incorporates strong authentication and uses an access control tree to represent privilege. Our system is real-time, perimeter based, community centric, and user friendly. The intelligent security decision that results from using an access control tree is commendably better than any current system. With our access control system we can dynamically determine capability based on real world conditions by incorporating security information from external data sources, software agents, as well as location based sensors.
Computer Security, Access Control, Information Classification, Tree Data Structures, RFID
Date of Defense
April 6, 2006.
A Thesis submitted to the Department of Computer Science in partial fulfillment of the requirements for the degree of Master of Science.
Includes bibliographical references.
Mike Burmester, Professor Directing Thesis; Alec Yasinsac, Committee Member; Daniel Schwartz, Committee Member.
Florida State University
Use and Reproduction
This Item is protected by copyright and/or related rights. You are free to use this Item in any way that is permitted by the copyright and related rights legislation that applies to your use. For other uses you need to obtain permission from the rights-holder(s). The copyright in theses and dissertations completed at Florida State University is held by the students who author them.