期刊文献+

基于模糊聚类的移动节点访问风险综合评判

Fuzzy-clustering-based Overall Evaluation of Mobile Node Access Risk
下载PDF
导出
摘要 针对移动节点的移动性和随机性,传统的身份认证和访问控制不能提供足够的安全保障,提出对移动节点进行风险评价.基于蜂窝历史访问信息评价信任风险,位置信息评价位置风险,时态信息评价时态风险,并提出使用CCRAA综合评判信任风险、位置风险和时态风险的综合风险,提高了移动节点访问行为的安全性,以及权限管理的灵活性,避免模糊综合评判因为权值分配带来的不确定性.最后,使用实例对CCRAA和模糊综合评判的风险评判过程进行了比较. Because conventional identity authentication and access control cannot ensure sufficient security due to the mobility and ran- domness of mobile nodes (MNs) ,risk evaluation is performed on MNs. Based the cellular historical access information to evaluate the trust risk, the positional information to assess the positional risk and the temporal information to evaluate the temporal risk, and using CCRAA to integrate the trust, positional and temporal risks into the access risk, strengthening security in MN access behavior and flexibility in authority management, for avoiding the uncertainties that are present in such integrative methods as the overall fuzzy e- valuation due to assignment of the weights. Finally, an example is used to compare the risk evaluation process between CCRAA and Fuzzy Overall Evaluation.
出处 《小型微型计算机系统》 CSCD 北大核心 2014年第8期1794-1797,共4页 Journal of Chinese Computer Systems
基金 国家自然科学基金面上项目(61370073)资助 湖南省教育厅科技计划项目(11C0286)资助
关键词 移动节点 访问授权 位置时态 风险评判 模糊聚合 mobile nodes access authorization positional temporal risk evaluation fuzzy aggregation
  • 相关文献

参考文献14

  • 1Celikel E, Kantarcioglu M, Thuraisinghan B, et al. Managing risks in RBAC employed distributed environments[ C]. On the Move to Meaningful Internet Systems 2007 : CoopIS, DOA, ODBASE, GADA, and IS, Berlin ,2007 : 1548-1566.
  • 2Celikel E, Kantarcioglu M, Thuraisingham B, et al. A risk manage- ment approach to RBAC [J ]. Risk and Decision Analysis, 2009,1 (11) :21-33.
  • 3Molloy I, Dickens L, Morisset C, et al. Risk-based security decisions under uncertainty[ C]. 2nd ACM Conference on Data and Applica- tion Security and Privacy, San Antonio,2012 : 157-168.
  • 4Elise P L, Bossaerts P. Risk unexpected uncertainty, and estimation uncertainty:bayesian learning in unstable settings [ J ]. PLoS Computational Biology ,2011,7 ( 1 ) : 1-14.
  • 5Luo J. Risk based mobile access control (RiBMAC) policy framework [ C ]. Military Communications Conference, Baltimore ,2011 : 1448-1453.
  • 6Bertino E, Bonatti P A, Ferrari E. TRBAC: a temporal role-based access control model[ J]. ACM Trans. Information and System Se- curity,2001,4(3) :191-233.
  • 7Bertino E,Catania B,Damiani M L,et al. GEO-RBAC:a spatially aware RBAC [ C]. Proceedings of the 10th ACM Symposium on Access Control Models and Technologies, Stockholm ,2005:29-37.
  • 8Chandran S M, Joshi J B D. LoT-RBAC:a location and time-based RBAC model [ C ]. Proceedings of the 6th International Conference on Web Information Systems Engineering, Newvork.2005 :361-375.
  • 9Ray I, Toahchoodee M. A spatio-temporal role-based access control model [ C ]. Proceedings of the 21 st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, CA,2007:211-226.
  • 10Zhao Gang, Liu Huan. Practical risk assessment based on multiple fuzzy comprehensive evaluations and entropy weighting [ J ]. Jounal Tsinghua Univ Sci&Tech ,2012,52(10) : 1382-1387.

二级参考文献32

  • 1孙波,赵庆松,孙玉芳.TRDM——具有时限的基于角色的转授权模型[J].计算机研究与发展,2004,41(7):1104-1109. 被引量:26
  • 2徐震,李斓,冯登国.基于角色的受限委托模型[J].软件学报,2005,16(5):970-978. 被引量:52
  • 3穆成坡,黄厚宽,田盛丰,林友芳,秦远辉.基于模糊综合评判的入侵检测报警信息处理[J].计算机研究与发展,2005,42(10):1679-1685. 被引量:49
  • 4翟征德.基于量化角色的可控委托模型[J].计算机学报,2006,29(8):1401-1407. 被引量:33
  • 5GB/T 20984-2007.信息安全技术信息安全风险评估规范[S].中国国家质量监督检验检疫局,2007.
  • 6Satoh N,Kumamoto H.An application of probabilistic riskassessment to information security audit[C] //Proceedings ofthe 9th WSEAS International Conference on Applied Informaticsand Communications.Kyoto,Japan:World Scientific andEngineering Academy and Society,2009:436-443.
  • 7NIU Honghui,SHANG Yanling.Research on riskassessment model of information security based on particleswarm algorithm—RBF neural network[C] //IEEEProceedings of 2010 Second Pacific-Asia Conference onCircuits,Communications and System.Piscataway,USA:IEEE Press,2010.
  • 8HU Chaoju,LV Chunmei.Method of risk assessment basedon classified security protection and fuzzy neural network[C] //IEEE Proceedings of the 2010Asia-Pacific Conferenceon Wearable Computing Systems.Piscataway,USA:IEEEPress,2010.
  • 9XIAO Long,QI Yong,LI Qianmu.Information security riskassessment based on analytic hierarchy process and fuzzycomprehensive[C] //IEEE Proceedings of the 2008International Conference on Risk Management&EngineeringManagement.Piscataway,USA:IEEE Press,2008.
  • 10Eminagaoglu M,Eren S.Implementation and comparison ofmachine learning classifiers for information security riskanalysis of a human resources department[J].InternationalJournal of Computer Information Systems and IndustrialManagement Applications,2011,3(2011):391-398.

共引文献61

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部