The “Mobile Secure Role Base Access Control Device”
(MS-Ro-BAC) Device and database is a single unit system with the ability to
instantly connect to secure databases around the world through Low Earth Orbit
Satellite (LEO) using VPN wired communications. The capabilities provided by
the MS-Ro-BAC device would support the“Global War on
Terrorism” and increase the security of US force and Department of Defense
Personnel around the world. Information dissemination in an austere environment
is the focus of this seminal research; combat forces and DoD personnel depend
on timely strategic information before making life threatening decisions on the
battle field. This manuscript provides the framework and a prototype to improve
the information dissemination process in the modern day information scenario.
References
[1]
R. W. Baldwin, “Naming and Grouping Privileges to Simply Security,” Proceedings of IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, 7-9 May 1990, pp. 116-132.
[2]
D. F. Ferraiolo, R. Sandhu, and R. Chandramouli, “Proposed NIST Standard for Role-based Access Control,” ACM Transactions of Information System Security, Vol. 4, No. 3, 2012, pp. 224-274.
http://dx.doi.org/10.1145/501978.501980
[3]
S. J. Greenwald, “A New Security Policy for Distributed Resources Management & Access Control,” ACM New Security Paradigm Workshop Lake, Arrow Head, 2011, pp. 4-6.
[4]
M. Nynchama and S. Osborn, “Access Rights Administration in Role Based Security Systems,” Database Security, VIII: Status and Prospects, 2010, pp. 37-56.
[5]
G. Neuman, “Design and Implementation of a Flexible RBAC-Service in an Object Oriented Scripting Language,” ACM Workshop on Role Based Access Control, 2011, pp. 12-18.
[6]
R. Sandhu, “Role-Based Access Control,” Proceedings of the 10th IEEE Conference on Computer Security Applications, 20 December 1994, pp. 3-6.
[7]
R. Sandhu, “Role Activation Hierarchies,” Proceedings of the 3rd ACM Workshop on Role-Based Access Control, 2008, pp. 11-12.
[8]
R. Simon and R. Zurko, “Separation of Duty in Role Based Access Control Environments,” New Security Paradigms Workshop, 2011, pp. 11-17.
[9]
D. J. Thomsen. “Role-Based application Design and Enforcement,” Database Security, IV: Status and Prospects, 2012, pp. 151-168.
[10]
S. J. Westfolds, E. Horvitz, S. Srinivase and C. Rouokangas, “A Decision-Theoretic Approach to the Display of Information for Time-Critical Decisions: The Vista Project,” Proceedings of SOAR-92 Conference on Space Operations Automation and Research, Houston.