中国综合性科技类核心期刊(北大核心)

中国科学引文数据库来源期刊(CSCD)

美国《化学文摘》(CA)收录

美国《数学评论》(MR)收录

俄罗斯《文摘杂志》收录

Message Board

Respected readers, authors and reviewers, you can add comments to this page on any questions about the contribution, review, editing and publication of this journal. We will give you an answer as soon as possible. Thank you for your support!

Name
E-mail
Phone
Title
Content
Verification Code
Issue 1
Mar.  2015
Turn off MathJax
Article Contents
CHE Tian-Wei, MA Jian-Feng, WANG Chao, LI Na. A quantitative analysis technique for multi-classes access control model based on security entropy[J]. Journal of East China Normal University (Natural Sciences), 2015, (1): 172-177. doi: 10.3969/j.issn.1000-5641.2015.01.021
Citation: CHE Tian-Wei, MA Jian-Feng, WANG Chao, LI Na. A quantitative analysis technique for multi-classes access control model based on security entropy[J]. Journal of East China Normal University (Natural Sciences), 2015, (1): 172-177. doi: 10.3969/j.issn.1000-5641.2015.01.021

A quantitative analysis technique for multi-classes access control model based on security entropy

doi: 10.3969/j.issn.1000-5641.2015.01.021
  • Received Date: 2014-08-01
  • Publish Date: 2015-01-25
  • To resolve the problem of quantitative analysis on classificatory information systems, a quantitative analysis technique is proposed based on security entropy. Firstly, the security entropy is put forward according to the information theory, to calculate the uncertainty of the system's determinations on the irregular access behaviors. Then the security theorems of classificatory information systems are defined based on security entropy. Finally, the typical access control models are analyzed by the technique, the technique's practicability is validated, and security and applicability of these models are compared. The result proves that the technique is suit for security quantitative analysis on access control model and evaluation to access control capability in information system
  • loading
  • [1]
    BELL D E, LAPADULA L J. Secure Computer Systems: Mathematical Foundations, M74-244 [R]. Bedford: Mass Mitre Corp, 1973: 66-79.
    BELL D E. Looking back at the Bell-La Padula model [C]//21st Annual Computer Security Applications Conference. Tucson, Arizona: [s.n.], 2005: 337-351.
    司天歌, 谭智勇, 戴一奇. 一种对多级安全模型安全性的分析方法~[J], 计算机研究与发展, 2008, 45(10): 1711-1717.
    傅祖芸. 信息论---基础理论与应用~[M]. 北京: 电子工业出版社, 2007.
    王贵宝, 黄洪钟, 张小玲.风险可能数------一种基于最大信息熵理论的风险度量和风险排序新方法~[J]. 航空学报, 2009, 30(9): 1684-1690.
    付钰, 吴晓平, 叶清等. 模糊集与熵权理论的信息系统安全风险评估研究~[J]. 电子学报, 2010, 38(7): 1490-1494.
    赵冬梅, 马建峰, 王跃生. 信息系统的模糊风险评估模型~[J]. 通信学报. 2007, 28(4): 51-56.
    国家质量技术监督局. GB/T 17859---1999计算机信息系统安全保护等级划分准则~[S]. 北京: 中国标准出版社, 1999.
    DENNING P. Third generation computer systems [J]. Computer Surveys, 1971, 3(4): 175-216.
    SANDHU R S, COYNE E J, FEINSTEIN H L. Role-based access control models [J]. IEEE Computer, 1996, 29(2): 38-47.
    翟征德, 徐震, 冯登国. 域间动态角色转换的静态互斥角色约束违反~[J]. 计算机研究与发展, 2008, 45(4): 677-683.
    WANG C, CHEN X Y, LI N. An access control mode based on information flow graph [C]//Proceedings of the International Conference on Computational Intelligence and Security. Sanya: [s.n.], 2011: 998-1000.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索
    Article views (864) PDF downloads(1050) Cited by()
    Proportional views

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return