首页> 外文会议>Advanced Topics in Optoelectronics, Microelectronics, and Nanotechnologies >On demand secure isolation using security models for different system management platforms
【24h】

On demand secure isolation using security models for different system management platforms

机译:根据不同系统管理平台使用安全模型的需求安全隔离

获取原文

摘要

System management defines the organization of information technology frameworks in a business data center. To be effective, a system management plan needs to deliver at their best the IT as a Service (ITaaS) and to allow the employees to respond in a rapid manner to the changing environment of a company. However, system management platforms deal with security breaches. Henceforth, the purpose of this paper is to present a solution that, with the aid of security models, there can be implemented a secure isolation. The designed security breach focuses the wireless communication protocols, showing that a Wi-Fi password can be hacked using a specialized software, such as Kali Linux. The analysis has been done on a well-known protocol used in Internet of Things (IoT) device management, called Lightweight Machine to Machine (LwM2M). For securely using LwM2M within a virtualized environment, On Demand Secure Isolation (ODSI) proposes Kali Linux for LwM2M's security bugs, as well as a solution for system management protection. The chosen security models that will be described are the Network Manager, the Keyring Manager and the Administration Manager.
机译:系统管理定义了业务数据中心的信息技术框架组织。为了有效,系统管理计划需要以最佳的IT作为服务(ITAAS),并允许员工以快速的方式对公司的变化环境进行回应。但是,系统管理平台处理安全漏洞。此后,本文的目的是提出一种解决方案,借助安全模型,可以实现安全隔离。设计的安全漏洞侧重于无线通信协议,表明可以使用诸如Kali Linux的专业软件来攻击Wi-Fi密码。该分析已经在以互联网(物联网)设备管理中使用的众所周知的协议进行了,称为轻量级机器到机器(LWM2M)。为了在虚拟化环境中使用LWM2M安全,按需安全隔离(ODSI)为LWM2M的安全错误提出Kali Linux,以及系统管理保护的解决方案。将描述的所选择的安全模型是网络管理器,键控管理器和管理管理器。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号