期刊文献+

移动环境多角色安全互斥风险的模糊评估

Fuzzy risk evaluation on multi-role security mutual exclusion in mobile environment
下载PDF
导出
摘要 传统机制解决移动环境多角色安全互斥问题的效率较低,为此,提出利用多角色综合敏感度评判安全互斥程度的解决方案。系统基于角色内部安全因素模糊评判角色敏感度,再采用补偿竞争算法计算多角色综合敏感度,即对角色敏感度进行海明距离补偿,取补偿后的最大值为多角色综合敏感度,使移动环境多角色系统在安全和效率间取得平衡。最后,分析了算法的复杂度,使用实例论证了算法可以提高角色的执行效率。 Since the traditional mechanism is low in efficiency to solve the multi-role security mutex in the mobile environment,a solution was proposed to determine the degree of security mutex using the multi-role comprehensive sensitivity.The system carried out fuzzy evaluation on the sensitivity of a role based on the internal security factors of the role,then calculated the comprehensive sensitivity of multiple roles utilizing the compensation competitive algorithm,i.e.did the Hamming distance compensation to the role sensitivity,took the compensated maximum as the multi-role comprehensive sensitivity,enabling the multi-role system in the mobile environment to achieve a balance between safety and efficiency.Finally,the algorithm has been analyzed for its complexity and an example demonstrates that the algorithm can increase the execution efficiency of the roles.
出处 《计算机应用》 CSCD 北大核心 2013年第8期2218-2221,共4页 journal of Computer Applications
基金 湖南省高校科技创新团队支持计划项目(湘教通[2010]212号) 湖南省教育厅科技计划项目(10C0528)
关键词 移动计算 安全互斥 模糊评判 敏感度 风险值 mobile computing security mutual exclusion fuzzy evaluation sensitivity value-at-risk
  • 相关文献

参考文献19

  • 1SANDHU R S, COYNE E J, FEINSTEIN H L, et al. Role-based access control models[ J]. IEEE Computer, 1996, 29(2) : 38 -47.
  • 2JOSHI J B D, BERTINO E, LATIF U, et al. A generalized tempo- ral role-based access control model [ J]. IEEE Transactions on Knowledge and Data Engineering, 2005, 17( 1): 4 -23.
  • 3BREWER D F C, NASH M. The Chinese wall security policy [ C]//Proceedings of the 1989 IEEE Symposium on Security and Privacy. Piscataway: IEEE, 1989:206-214.
  • 4HOSMER H H. Using fuzzy logic to represent security policies in the muhipolicy paradigm [ J]. ACM SIGSAC Reviews, 1992,10(4) : 12 -21.
  • 5TAKABI H, AMINI M. Separation of duty in role-based access con- trol model through fuzzy relation[ C]// IAS 2007: Proceedings of the Third International Symposium on Information Assurance and Securi- ty. Piscataway: IEEE, 2007:125-130.
  • 6NAWARATHNA U H G R D, KODITHUWAKKU S R. A fuzzy role based access control model for database security[ C]// Proceedings of the 2005 International Conference on Information and Automation. Piscataway: IEEE, 2005:313 -318.
  • 7MARTINEZ-GARCfA C, NAVARRO-ARRIBAS G, BORRELL J. Fuzzy role-based access control[ J]. Information Processing Letters, 2011,111 (10) : 483 - 487.
  • 8窦文阳,王小明,张立臣.普适环境下的动态模糊访问控制模型研究[J].计算机科学,2010,37(9):63-67. 被引量:8
  • 9刘武,段海新,张洪,任萍,吴建平.TRBAC:基于信任的访问控制模型[J].计算机研究与发展,2011,48(8):1414-1420. 被引量:30
  • 10王艳辉,肖雪梅,贾利民.互操作信任的模糊变权动态综合评价方法[J].计算机研究与发展,2012,49(6):1235-1242. 被引量:8

二级参考文献43

共引文献44

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部