期刊文献+

基于风险的访问控制操作需求计算方法研究 预览 被引量:1

Research on computing method of operational need in risk-based access control
在线阅读 下载PDF
收藏 分享 导出
摘要 针对基于风险的访问控制中缺乏对操作需求详细分析与量化,在分析操作需求的基础上,提出了一种静态与动态相结合的操作需求计算方法。引入访问目的层次结构,提出目的森林的概念,并给出客体目的森林遍历算法,从而计算静态操作需求;统计客体的被访问历史,并基于EWMA给出动态操作需求的计算方法。在分析静态和动态操作需求关系的基础上,给出操作需求的计算方法。讨论和分析结果表明,该方法能够更为准确、动态地体现访问操作需求。 To the deficiency of the detailed analysis and quantification of the operational need in risk-based access control, on the basis of analyzing the operational need, an operational need quantification method combining static and dynamic is proposed. Firstly, purpose hierarchy is introduced, the concept of purpose forest is presented and the object purpose forest traversing algorithm is given, which in turn computed the static operational need. Secondly, the object~s history of being accessed is counted, and then based on the EWMA, the computing method of the dynamic operational need is put forward. Finally, on the basis of analyzing the relation between the static and dynamic operational need, the computing method of the operational need is given. The discussion and analysis shows that it can reflect the access operational need more accurately and dynamically.
作者 解文冲 杨英杰 汪永伟 代向东 XIE Wen-chong, YANG Ying-jie, WANG Yong-wei, DAI Xiang-dong (1. PLA Information Engineering University, Zhengzhou 450004, China; 2. Henan Key Laboratory of Information Security, Zhengzhou 450004, China)
出处 《计算机工程与设计》 CSCD 北大核心 2013年第7期2281-2285,共5页 Computer Engineering and Design
基金 国家973重点基础研究发展计划基金项目(2011CB311901) 国家863高技术研究发展计划基金项目(2012AA012704) 河南省科技创新人才计划基金项目(114200510001)
关键词 访问控制 文件保护 操作需求 目的层次结构 指数加权移动平均 access control file protection operational need purpose hierarchy EWMA (exponentially weighted moving ave-rage)
  • 相关文献

参考文献11

  • 1Riaz Ahmed Shaikh, Kamel Adi, Luigi Logrippo. Dynamic risk-based decision methods for access control systems [J]. Computers & Security, 2012, 31 (4): 447-464. 被引量:1
  • 2Ahmed AL Faresi. Risk-based models for managing data privacy in healthcare [D]. USA: ProQuest Dissertations and Theses, 2011. 被引量:1
  • 3McGraw R. Risk-adaptable access control RADAC [R]. Privilege (Access) Management Workshop. NIST-National Institute of Standards and Technology-Information Technology Laboratory; 2009. 被引量:1
  • 4Cheng Pau-Chen, Pankaj Rohatgi, Claudia Keser. Fuzzy MLS.. An experiment on quantified risk-adaptive access control [C] //Oakland, California, USA: IEEE Symposium on Security and Privacy, 2007. 被引量:1
  • 5Ni Q, Bertino E, Lobo J. Risk-based access control systems built on fuzzy inferences [C] //NY, USA: Proceedings of the 5th ACM Symposium on Information, 2010. 被引量:1
  • 6Wang Q, Jin H. Quantified risk-adaptive access control for patient privacy protection in health information systems [C] // NY, USA: Proceedings of the 6th ACM Symposium on Information, 2011. 被引量:1
  • 7Li M, Sun X, Wang H, et al. Optimal privacy-aware path in hippocratic databases[J]. Database Systems for Advanced Applications, 2009, 5463: 441-455. 被引量:1
  • 8Massacci F. Hierarchical hippocratic databases with minimal disclosure for virtual organizations [J]. The International Journal on Very Large Data Bases, 2006, 15 (4): 370-387. 被引量:1
  • 9刘逸敏,周浩峰,王智慧,汪卫.Purpose融合:基于风险purpose的隐私查询访问控制[J].计算机学报,2010(8):1339-1348. 被引量:3
  • 10杨智,金舒原,段毅,方滨兴.多级安全中敏感标记的最优化挖掘[J].软件学报,2011,22(5):1020-1030. 被引量:6

二级参考文献41

  • 1李益发,沈昌祥.一种新的操作系统安全模型[J].中国科学:E辑,2006,36(4):347-356. 被引量:19
  • 2Lorrie F C,Lawrence L.Web Privacy with P3P.O′Reilly Media,Incorporated,2002. 被引量:1
  • 3OECD.Report on the cross-border enforcement of privacy laws.Oecd/Ocde 2006,2006. 被引量:1
  • 4Kabir M E,Wang H.Conditional purpose based access control model for privacy protection//Proceedings of the 20th Australasian Database Conference (ADC2009).Wellington,New Zealand,2009:137-144. 被引量:1
  • 5Agrawal R,Kiernan J,Srikant R,Xu Y.Hippocratic databases// Proceedings of the 28th International Conference on Very Large Data Bases(VLDB'02).Hong Kong,China,2002:143-154. 被引量:1
  • 6Byun J W,Bertino E,Lui N.Purpose-based access control for privacy protection in relational database systems.Purdue University,CERIAS Technical Report 2004-52,2004. 被引量:1
  • 7Byun J-W et al.Purpose based access control of complex data for privacy protection//Proceedings of the 10th ACM Symposium on Access Control Models and Technologies(SACMAT'05).Stockholm,Sweden,2005,102-110. 被引量:1
  • 8LeFevre K,Agrawal R,Ercegovac V.Limiting disclosure in hippocratic databases//Proceedings of the 30th International Conference on Very Large Data Bases(VLDB'04).Toronto,Canada,2004,30:108-119. 被引量:1
  • 9Editorial.Some issues in privacy data management.Data & Knowledge Engineering,2007,63(3):591-596. 被引量:1
  • 10Agrawal R,Kini A.Managing healthcare data hippocratically//Proceedings of the 2004 ACM SIGMOD international Conference on Management of Data.Paris,France,2004:947-948. 被引量:1

共引文献7

同被引文献22

  • 1http://gd.qq.com/a/20150316/021748.htm[EB/OL]. 被引量:1
  • 2http://www.ehnrailway.com/html/20150317/867407.shtml[EB/OL]. 被引量:1
  • 3http://news.ifeng.com/a/20150121/4298523 l_0.shtml[EB/OL]. 被引量:1
  • 4http://www.eweek.com/c/a/Health-Care-IT/Utah-Health-Care-Data- Breach-Exposed-About-780000-Patient-Files- 189084[EB/OL]. 被引量:1
  • 5SANDHU R. The future of access control: attributes, automation, and adaptation[A]. Computational Intelligence, Cyber Security and Com- putational Models[C]. 2014.45-45. 被引量:1
  • 6SANDHU R, PIERANGELA S. Access control: principle and practice [J]. Communications Magazine, 1994, 32(9): 40-48. 被引量:1
  • 7GRAHAM G S, DENNING P J. Protection: principles and practice [A]. Proceedings of the Conference[C].ACM, 1972.417-429,. 被引量:1
  • 8HARRISON M A, RUZZO W L, ULLMANJ D. Protection in operat- ing systems[J]. Communications of the ACM, 1976, 19(8): 461-471. 被引量:1
  • 9SANDHU R, COYNE E, FEINSTEIN H, et al. Role-based access control models [J]. Computer, 1996, 29(2):38-47. 被引量:1
  • 10JASONPROGRAMOFFICE. Horizontal Integration: Broader Access Models for Realizing Information Dominance[R]. The MITRE Cor- poration 2004. 被引量:1

引证文献1

二级引证文献15

投稿分析
职称考试

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部 意见反馈