期刊文献+

CEP隐私安全事件属性检测树及访问控制框架

CEP Privacy Security Event Attribute Detection Tree and Access Control Framework
下载PDF
导出
摘要 为防止非法用户通过注册事件模式的方式获取复杂事件处理(Complex Event Processing,CEP)过程中所涉及到的关键信息,在不影响CEP处理效率的情况下,提供隐私安全保护的能力.文中讨论了CEP的隐私安全访问控制对象;形式化定义了完全读取、部分读取、拒绝访问及数量统计等四类事件属性操作符;给出了以事件属性检测树为运行机制的隐私安全保护引擎;提出了一种新颖可行的访问控制框架.实验结果表明:该框架隐私安全检测引擎运行效率控制在毫秒级别,事件流吞吐率达千个event·s-1以上,实现了隐私信息的高效过滤. The study aims to prevent illegal users from accessing key information in the complex event processing in the way of event pattern registration and to provide privacy protection without affecting the processing efficiency. The paper discusses the object of CEP privacy security access control, and gives formalized definition of the four types of event attribute operators--fully reading, part reading, access rejection,and quantitative statistics. Also the privacy security engine is given, and a novel and feasible CEP privacy access control framework is proposed. Experimental results show that the framework privacy security detection engine operates only at the level of milliseconds, and the event stream throughput rate is over 1 000 events per second. It is concluded that this framework can filter privacy information with high efficiency.
出处 《西安工业大学学报》 CAS 2016年第7期533-538,共6页 Journal of Xi’an Technological University
基金 陕西省教育厅专项科研计划项目(14JK1354) 西安工业大学校长基金(XAGDXJJ15015)
关键词 复杂事件处理(CEP) 隐私安全 事件属性检测树 访问控制 complex event processing(CEP) privacy security event attribute detection tree access control
  • 相关文献

参考文献7

  • 1LUCKHAM D. The Power of Events: An Introduc- tion to Complex Event Processing in Distributed En- terprise Systems[M]. Springer, American, 2008.
  • 2BUDDHIKA T,RAY I, LINDERMAN M, et al. Se- cure Pomplex Event Processing in a Heterogeneous and Dynamic Network[C]//SPIE Defense+Security, International Society for Optics and Photonics. Am- sterdam : SPIE Proceedings, 2014,9097 : 891.
  • 3CARMINATI B, FERRARI E, TAN K L. Enforcing Ac cess Control Over Data Streams[C]//Proceedings of the 12th ACM Symposium on Access Control Models and Technologies. New York : ACM Press, 2009 : 21.
  • 4CARMINATI B, FERRARI E, CAO J, et al. A Framework to Enforce Access Control Over Data Streams[J]. ACM Transactions on Information and System Security (TISSEC), 2010,13 (8): 28.
  • 5荆心,张璟.多事件模式并行CEP处理研究[J].西安工业大学学报,2014,34(9):715-719. 被引量:1
  • 6唐金鹏,李玲琳,杨路明.面向用户属性的RBAC模型[J].计算机工程与设计,2010,31(10):2184-2186. 被引量:13
  • 7熊厚仁,陈性元,张斌,杨艳.基于RBAC的授权管理安全准则分析与研究[J].计算机科学,2015,42(3):117-123. 被引量:10

二级参考文献30

  • 1李帆,郑纬民.基于角色与组织的访问控制模型[J].计算机工程与设计,2005,26(8):2136-2140. 被引量:27
  • 2杨庚,沈剑刚,容淳铭.基于角色的访问控制理论研究[J].南京邮电大学学报(自然科学版),2006,26(3):1-8. 被引量:15
  • 3NIST.The NIST model for RBAC[EB/OL].http://csrc.nist.gov/ rbac/RBAC2000,2009.
  • 4ISO10181-3.访问控制系统框架[Z].
  • 5潘德锋,彭霞,吴信才.RBAC和FBAC的适用条件与集成[J].计算机工程,2007,33(19):147-149. 被引量:2
  • 6CUGOLA G, MARGARA A. Processing Flows of Information: From Data Stream to Complex Event Processing[J]. ACM Computing Surveys (CSUR), 2012,44(3) : 15.
  • 7CUGOLA G, MARGARA A. Complex Event Processing with T-Rex[J]. Journal of Systems and Software,2012,85(8) :1709.
  • 8AGRAWAL J,DIDOA Y, GYLLSTROM D, et al. Efficient Pattern Matching over Event Streams[C]// Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data. Vancouver : ACM, 2008 : 147.
  • 9FerraioloD, KuhnDR. Role-Basedaccesscontrol[ C] // Procee- dings of the 15th National Computer Security Conference. 1992: 554-563.
  • 10Sandhu R, Coyne E, Feinstein H, et al. Role-based Access Con- trol Models[J]. IEEE Computer, 1996,29 (2) : 38-47.

共引文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部