期刊文献+

一种模糊BLP模型 被引量:1

A Fuzzy BLP Model
下载PDF
导出
摘要 BLP模型是一种适用于军事安全策略的计算机系统安全模型,基于模糊逻辑方法对经典BLP模型进行改进,提出了一种模糊BLP模型(FBLP),证明了该模型的安全性。它适用于商用计算机系统安全建模,在安全电子政务、电子商务等领域会有广泛应用。 BLP model is a computer system's security model that applies to military security policy. This article improves the classical BLP model using methods of the fuzzy logic theory, puts forward a new fuzzy-based BLP model (FBLP), and proves the security of the FBLP model. It is applicable to commercial computer system security model, and will have far-ranging applications in the areas of E business and E government.
出处 《微电子学与计算机》 CSCD 北大核心 2007年第2期212-214,共3页 Microelectronics & Computer
关键词 BLP模型 安全策略 模糊逻辑 模糊BLP模型 BLP model Security policy Fuzzy logic Fuzzy BLP model
  • 相关文献

参考文献3

二级参考文献11

  • 1[1]Miller B. Vital signs of identity[J]. IEEE Spectrum, 1994,31(2):22-30.
  • 2[5]John A Robinson, Vicky M Liang, J A Michael Chambers, Christine L MacKenzie. Computer User Verification Using Login String Keystroke Dynamics[J]. IEEE Transactions On Systems, Man, and Cybernetics, 1998,28(2):236-241.
  • 3[6]Fabian Monrose, Aviel D Rubin. Keystroke dynamics as a biometric for authentication[J]. Future Generation Computer Systems, 2000,16:351-359.
  • 4[7]Saleh Bleha, Charles Slivinsky, Bassam Hussien. Computer-Access Security Systems Using Keystroke Dynamics[J]. IEEE Transactions On Pattern Analysis and Machine Inetlligence, 1990,12(12):1217-1222.
  • 5[8]Willem G de Ru, Jan H P Eloff. Enhanced password authentication through fuzzy logic[J]. IEEE Expert, 1997,12(6):38-45.
  • 6[9]Francesco Bergadano, Daniele Gunetti, Claudia Picardi University of Torino. User Authentication through Keystroke Dynamics[J]. ACM Transactions on Information and System Security, 2002,5(4):367-397.
  • 7[10]Yu Enzhe, Cho Sungzoon. GA-SVM Wrapper Approach for Feature Subset Selection in Keystroke Dynamics Identity Verifcation[J]. IEEE, 2003(3):2253-2257.
  • 8[11]Obaidat M S. A simulation evaluation study of neural network techniques to computer user identification[J]. Information Sciences, 1997,102:239-258.
  • 9曲维光,宋如顺.基于用户击键特征识别的用户认证系统[J].计算机工程与应用,2002,38(16):69-70. 被引量:8
  • 10刘学军,陈松灿,彭宏京.基于支持向量机的计算机键盘用户身份验真[J].计算机研究与发展,2002,39(9):1082-1086. 被引量:26

共引文献2

同被引文献6

  • 1魏艳华,孙玲玲.一种模糊规则的确定方法[J].微电子学与计算机,2005,22(3):156-158. 被引量:1
  • 2Sandhu R,Park J.Usage control:a vision for next generation accegs control MMM-ACNS[EB/OL].http://www.list.gmu.edu/conference_papers.htm,2003
  • 3Park J,Sendhu R.The usage control model[C].ACM Transactions on Information and System Security,2004,7(1):128-174
  • 4Zadeh LA.The concept of a linguistic variable and its application to approximate reasoning[M].Beijing:Science Press,1982:23-33
  • 5Park J,Sandhu R.The ABC core model for usage control:integrating authorizations,oBligations,and conditions[C].ACM Transactions on Information and System Security,2002,2(3)
  • 6刘大有,唐海鹰,陈建中,孙吉贵.加权模糊逻辑[J].计算机研究与发展,1998,35(11):961-965. 被引量:12

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部