Handbook of Computer Networks and Cyber Security 2020
DOI: 10.1007/978-3-030-22277-2_24
|View full text |Cite
|
Sign up to set email alerts
|

Investigation of Security Issues in Distributed System Monitoring

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
2
0
1

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 10 publications
0
2
0
1
Order By: Relevance
“…We call the system that can serve the users as a single system by working in communication and coordination among the servers, although data logically linked to one another is distributed on different servers, as a distributed database system [18]. Each one of the storage units shown in Fig.…”
Section: Distributed Database and Data Security 31 Distributed Databasementioning
confidence: 99%
“…We call the system that can serve the users as a single system by working in communication and coordination among the servers, although data logically linked to one another is distributed on different servers, as a distributed database system [18]. Each one of the storage units shown in Fig.…”
Section: Distributed Database and Data Security 31 Distributed Databasementioning
confidence: 99%
“…Günümüzde birçok uygulama alanına özgü tasarlanmış erişim kontrol modelleri mevcuttur. Ancak bu modellerin, sayısı hızla artan ve gittikçe daha karmaşık hale gelen sistemler üzerinde ihtiyaçları tam olarak karşılayamadığını, sistemlere ciddi bir mali yük getirdiğini, bilgi akış denetimini tam olarak sağlayamadığını ve uygulamada esnekliğin çok büyük bir oranda yitirilmesine sebebiyet verdiğini görmekteyiz (Kotari and Chiplunkar 2020, Kotari et al2016, Shin et al 2015, Reid et al 2014. Bu nedenle erişim kontrol modellerinin, bilgi sistemlerini sadece yetkisiz erişimlerden, kötü niyetli kullanıcılardan ve hatalı kullanımlardan koruyacak şekilde yapılandırılmış olmasının tek başına yeterli olmadığı, aynı zamanda kolay yönetilebilir ve ölçeklenebilir olması, organizasyon yapısına uygun ve erişim kontrolü işlevselliğinin tutarlı bir şekilde tasarlanmış olmasının da büyük önem taşıdığı gözlenmektedir.…”
Section: Introductionunclassified
“…Today, there are access control models specifically designed. However, it is seen that these models cannot completely meet the needs of the rapidly increasing number of systems that are becoming more complex day by day, place a serious financial burden on the system, cannot completely ensure data flow control, and, to a great degree, cause a loss of flexibility in the application [6][7][8][9]. For this reason, it is also seen that it is not only sufficient for the access control models to be configured to protect the information systems from unauthorized accesses, malicious users, and erroneous use; it is also important that they be easily manageable and scalable in accordance with the organizational structure and that the access control functionality be designed consistently.…”
Section: Introductionmentioning
confidence: 99%