DocumentCode
3132408
Title
SLOGS: Security through predicate LOGic in SSH
Author
Hussain, Shujaat ; Abbass, Mohsin ; Malik, Owais ; Anwar, Zahid
Author_Institution
Dept. of Comput., Nat. Univ. of Sci. & Technol., Islamabad, Pakistan
fYear
2010
fDate
18-19 Oct. 2010
Firstpage
256
Lastpage
260
Abstract
SLOGS is an implementation of mandatory access control mechanism in SSH protocol. It takes an input from the user about his location and session priority and then implements some predicates and facts which are divided into three sets namely Security influential predicates (set 1), normal security predicates (set 2) and backup system predicates (set 3). The implementation of one or all sets is on the discretion of the administrator of the system. There is a tradeoff between security and performance; when all sets are applied the security is increased but the performance will be decreased. The performance and security were decided by the location and requirement of the user.The system is implemented using type-1 fuzzy logic to take care of the imprecision in input to the systems.
Keywords
authorisation; computer network security; cryptographic protocols; fuzzy logic; SLOGS; SSH protocol; backup system predicates; mandatory access control mechanism; security influential predicate; security through predicate logic in ssh; session priority; system administrator; type-1 fuzzy logic; Electronic mail; Encryption; Protocols; Servers; Virtual private networks; fuzzy logic; predicate logic; security; ssh;
fLanguage
English
Publisher
ieee
Conference_Titel
Emerging Technologies (ICET), 2010 6th International Conference on
Conference_Location
Islamabad
Print_ISBN
978-1-4244-8057-9
Type
conf
DOI
10.1109/ICET.2010.5638478
Filename
5638478
Link To Document