期刊文献+

风险自适应PBCUC研究 被引量:1

Study of Risk-Adaptable PBCUC
下载PDF
导出
摘要 针对现有RAd AC研究中并不完全满足NSA提议的现状,介绍这种访问控制模型及风险,并在分析、归纳RAdAC核心特征的基础上,提出了RAdAC的抽象模型。此模型不但在策略、输入元素等方面更准确和精细,功能上也有利于知识沉淀与启发调整策略和优化决策,以及实时、交互管理策略。此外,设计RAdAC抽象模型与PBCUC结合的RAdPBCUC模型,从而对决策和执行的全过程都进行控制,使决策和执行都能适应风险。 In view of the present situation that NSA proposal, the access control model and risk existing RAdAC research could not completely meet the is given, and based on analysis and induction of the core features of RAdAC, the abstract model of RAdAC is proposed. This model is more accurate and precise in access control policies and input elements, and also beneficial to getting the knowledge from the past access control decisions and inspiration, making it a more inspiring guide to adjust and optimize policies and access control decisions, and managing policies in real time and interactively. In addition, the RAdPBCUC model, integrated with the abstract model and the PBCUC, is designed to control the whole process of decision making and execution, and also to adapt the risk of decision making and execution.
出处 《通信技术》 2016年第7期890-895,共6页 Communications Technology
关键词 访问控制 安全风险 风险自适应 安全策略 access control security risk risk adaptable security policy
  • 相关文献

参考文献14

  • 1McGrawR W.Securing Content in the Department of Defense's Global Information Grid[M].Bnffalo:Secure Knowledge Management Workshop,2004:1-11.
  • 2Jason Program Office.Horizontal Integration:Broader Access Models for Realizing Information Dominance[R]. Bedford:The MITRE Corporation,2004.
  • 3McGrawR W.Risk-Adaptable Access Control (RAdAC) [M].Gaithersburg:NIST Privilege (Access) Management Workshop,2009:1-10.
  • 4Rahim Choudhary.A Policy based Architecture for NSA RAdAC Model[C].Proceedings of the 2005 IEEE Workshop on Information Assurance and Security,2005:295-301.
  • 5ChengP C,Rohatgi P,Keser C.Fuzzy MLS:An Experiment on Quantified Risk-Adaptive Access Control[C].2007 IEEE Symposium on Security and Privacy,2007:222-230.
  • 6Kandala S,Sandhu R,Bhamidipati V.An Attribute based Framework for Risk-Adaptive Access Control Models[C].2011 Sixth International Conference on Availability,Reliability and Security(ARES),2011:22-26.
  • 7BIJON K Z,KRISHNAN R,SANDHU R.A Framework for Risk-aware Role based Access Control[C]. Proceedings of the 6th Symposium on Security Analytics and Automation,2013:462-469.
  • 8Dos SantosD R,WestphallC M,WestphallC B.A Dynamic Risk-based Access Control Architecture for Cloud Computing[C].Network Operations and Management Symposium(NOMS),2014:1-9.
  • 9惠榛,李昊,张敏,冯登国.面向医疗大数据的风险自适应的访问控制模型[J].通信学报,2015,36(12):190-199. 被引量:25
  • 10D i az-LopezD,D olera-TormoG,G o mez- M a rmolF,et al. Dynamic Counter-measures for Risk- based Access Control Systems:An Evolutive Approach[J]. Future Generation Computer Systems,2016(55):321-345.

二级参考文献36

  • 1罗万伯,罗霄岚,陈炜,李征,魏雁平.多域环境的安全策略管理框架研究[J].四川大学学报(工程科学版),2006,38(2):114-117. 被引量:7
  • 2http://gd.qq.com/a/20150316/021748.htm[EB/OL].
  • 3http://www.ehnrailway.com/html/20150317/867407.shtml[EB/OL].
  • 4http://news.ifeng.com/a/20150121/4298523 l_0.shtml[EB/OL].
  • 5http://www.eweek.com/c/a/Health-Care-IT/Utah-Health-Care-Data- Breach-Exposed-About-780000-Patient-Files- 189084[EB/OL].
  • 6SANDHU R. The future of access control: attributes, automation, and adaptation[A]. Computational Intelligence, Cyber Security and Com- putational Models[C]. 2014.45-45.
  • 7SANDHU R, PIERANGELA S. Access control: principle and practice [J]. Communications Magazine, 1994, 32(9): 40-48.
  • 8GRAHAM G S, DENNING P J. Protection: principles and practice [A]. Proceedings of the Conference[C].ACM, 1972.417-429,.
  • 9HARRISON M A, RUZZO W L, ULLMANJ D. Protection in operat- ing systems[J]. Communications of the ACM, 1976, 19(8): 461-471.
  • 10SANDHU R, COYNE E, FEINSTEIN H, et al. Role-based access control models [J]. Computer, 1996, 29(2):38-47.

共引文献24

同被引文献6

引证文献1

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部