• DocumentCode
    3132408
  • Title

    SLOGS: Security through predicate LOGic in SSH

  • Author

    Hussain, Shujaat ; Abbass, Mohsin ; Malik, Owais ; Anwar, Zahid

  • Author_Institution
    Dept. of Comput., Nat. Univ. of Sci. & Technol., Islamabad, Pakistan
  • fYear
    2010
  • fDate
    18-19 Oct. 2010
  • Firstpage
    256
  • Lastpage
    260
  • Abstract
    SLOGS is an implementation of mandatory access control mechanism in SSH protocol. It takes an input from the user about his location and session priority and then implements some predicates and facts which are divided into three sets namely Security influential predicates (set 1), normal security predicates (set 2) and backup system predicates (set 3). The implementation of one or all sets is on the discretion of the administrator of the system. There is a tradeoff between security and performance; when all sets are applied the security is increased but the performance will be decreased. The performance and security were decided by the location and requirement of the user.The system is implemented using type-1 fuzzy logic to take care of the imprecision in input to the systems.
  • Keywords
    authorisation; computer network security; cryptographic protocols; fuzzy logic; SLOGS; SSH protocol; backup system predicates; mandatory access control mechanism; security influential predicate; security through predicate logic in ssh; session priority; system administrator; type-1 fuzzy logic; Electronic mail; Encryption; Protocols; Servers; Virtual private networks; fuzzy logic; predicate logic; security; ssh;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Emerging Technologies (ICET), 2010 6th International Conference on
  • Conference_Location
    Islamabad
  • Print_ISBN
    978-1-4244-8057-9
  • Type

    conf

  • DOI
    10.1109/ICET.2010.5638478
  • Filename
    5638478