期刊文献+

主动模糊访问控制规则集终止性分析 被引量:1

Termination Analysis for Active Fuzzy Access Control Rules Set
下载PDF
导出
摘要 基于主动模糊规则的访问控制模型,可以实现普适计算环境下资源的安全主动模糊自适应访问控制,而构造的访问控制规则集的终止性是决定模型实际是否可用的一个关键问题。提出了一种基于元图理论的主动模糊访问控制规则集终止性分析方法,用模糊触发元图(fuzzy triggering metagraphs,FTMG)表示主动模糊访问控制规则之间复杂的触发和激活关系,通过分析FTMG的邻接矩阵闭包,寻找最小真触发环,进而判断主动模糊访问控制规则集的终止性。通过实例分析验证了该方法的有效性和可用性,仿真实验结果表明,使用该方法分析大规模主动模糊规则集终止性时具有较高的时间效率。 Access control model based on active fuzzy rule can achieve fuzzy adaptive control to the resources in ubiquitous computing environment. However, how to judge the termination of access control rules set is a key issue to determine whether the access control model is available. This paper proposes a termination analysis method based on metagraphs theory for active fuzzy access control rules set. It presents fuzzy triggering metagraphs (FTMG) to represent the triggering and activation relations between active fuzzy rules, and detects the minimum true triggering cycle by analyzing FTMG adjacency matrix closure for determining the termination of active fuzzy access control rules set. Finally, a prototype system shows that the method is valid, and the simulation results show that the method is efficient in the analysis of large rules set.
出处 《计算机科学与探索》 CSCD 2013年第3期193-208,共16页 Journal of Frontiers of Computer Science and Technology
基金 国家自然科学基金 Nos.61173094 60970054 60773224 教育部留学回国人员科研启动基金~~
关键词 普适计算 主动访问控制 主动模糊规则 终止性分析 模糊授权 ubiquitous computing active access control active fuzzy rule termination analysis fuzzy authorization
  • 相关文献

参考文献20

  • 1Friedewald M, Raabe O. Ubiquitous computing: an over- view of technology impacts[J]. Telematics and Informatics, 2011, 28(2): 55-65.
  • 2Denko M K, Sun Tao, Woungang I. Trust management in ubiquitous computing: a Bayesian approach[J]. Computer Communications, 2010, 34(3): 398-406.
  • 3WANG Xiaoming,ZHAO Zongtao.A Service Oriented Voting Authorization Model[J].Chinese Journal of Electronics,2006,15(1):37-40. 被引量:2
  • 4刘逸敏,王智慧,周皓峰,汪卫.基于Purpose的隐私数据访问控制模型[J].计算机科学与探索,2010,4(3):222-230. 被引量:6
  • 5A1-Muhtadia J, Hillb R, AI-Rwais S. Access control using threshold cryptography for ubiquitous computing environ- ments[J]. Journal of King Saud University Computer and Information Sciences, 2011, 34(1): 1-8.
  • 6Zhang Longhua, Alan G J, Chu B T. A rule-based frame- work for role-based delegation and revocation[J]. ACM Transactions on Information and System Security, 2003, 6(3): 404-441.
  • 7Yamanya H F E, Capretz M A M, Allison D S. Intelligent security and access control framework for service-oriented architecture[J]. Information and Software Technology, 2010, 52(2): 220-236.
  • 8Minami K, Kotz D. Secure context-sensitive authorization[J]. Journal of Pervasive and Mobile Computing, 2005, 1(1): 26-52.
  • 9王小明.面向普适计算的区间值模糊访问控制(英文)[J].计算机科学与探索,2010,4(10):865-880. 被引量:5
  • 10林闯,田源,姚敏.绿色网络和绿色评价:节能机制、模型和评价[J].计算机学报,2011,34(4):593-612. 被引量:150

二级参考文献26

  • 1林闯,汪洋,李泉林.网络安全的随机模型方法与评价技术[J].计算机学报,2005,28(12):1943-1956. 被引量:92
  • 2林闯,王元卓,杨扬,曲扬.基于随机Petri网的网络可信赖性分析方法研究[J].电子学报,2006,34(2):322-332. 被引量:43
  • 3Organization for Economic Co-operation and Development (OECD).Report on the cress-border enforcement of privacy laws[R/OL].[2006].http://www.oecd.org/sti/security-privacy.
  • 4US Department of Health and Human Services.Summary of HIPAA privacy rule[S/OL].[2004].http://www.hhs.gov/ocr/hipaa/.
  • 5World Wide Web Consortium (W3C).Platform for privacy preferences (P3P)[EB/OL].hltp://www.w3.org/P3P.
  • 6Powers C S,Ashley P,Schunter M.Privacy promises,access control,and privacy management.Enforcing privacy throughout an enterprise by extending access control[C]//Proc of the 3rd International Symposium on Electronic Commerce,2002:13-21.
  • 7Ni Qun,Trombetta A,Bertino E,et al.Privacy-aware role based access control[C]//Pree of 12th ACM Symposium on Access Control Models and Technologies.Sophia Antipolis,France:ACM Press,2007:41-50.
  • 8Information Technology Industry Council.ANSI INCITS 359-2004 American national standard for information technologyrole-based access control[S].2004.
  • 9Agrawal R,Kieman J,Srikant R,et al.Hippocratic databases[C]//Proe of the 28th lnt'l Conf on Very Large Databases (VLDB).Hang Kong,China:ACM Press,2002:143-154.
  • 10Laura-Silva Y,Aref W G.Realizing privacy-preserving features in hippocratic databases[C]//Proc of of the 23rd International Conference on Data Engineering Workshops.Istanbul,Turkey:IEEE Press,2007:198-206.

共引文献192

同被引文献10

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部