期刊文献+

实现行为监控的多级访问控制模型

Multi-Level Access Control Model Based on Action Monitoring
下载PDF
导出
摘要 分布式信息系统中,内部用户一直都是数据泄露的头号威胁。在已有的多级访问控制模型中,主体一旦拥有某种操作权限,就能对集群内的多个客体进行操作,存在主体对客体过度访问的问题。主体的过度访问增加系统敏感信息泄露的风险,对系统的机密性造成威胁。针对系统的机密性进行研究,通过在已有模型中增加风险管理,对主体行为进行监控并动态调整其访问能力,保障信息系统的机密性。 In distributed information systems, internal users have always been the number one threat to information disclosure. In the existing multi- level access control model, once the subject has some operation authority, it can operate multiple objects in the group, and there is a prob- lem that the subject has excessive access to the object. The excessive access of the subject increases the risk of disclosure of sensitive infor- mation and threatens the confidentiality of the system. Studies the confidentiality of the system, and adds risk management of the to the sub- ject's behavior in the existing model. By monitoring the subject's behavior to dynamically adjust the subject's access ability, it can effective- ly control the subject's access, and ensure the confidentiality of the information system.
作者 董玉蓉 王鹏程 DONG Yu-rong;WANG Peng-cheng(College of Information Technology and Communication,University of Hexi,Zhangye 734000;China United Telecommunications Corporation Zhangye Branch,Zhangye 734000)
出处 《现代计算机》 2018年第17期47-51,共5页 Modern Computer
关键词 访问控制 机密性 风险管理 动态监控 Access Control Confidentiality Risk Management Dynamic Monitoring
  • 相关文献

参考文献6

二级参考文献71

  • 1孙瑞锋,赵政文.基于云计算的资源调度策略[J].航空计算技术,2010,40(3):103-105. 被引量:43
  • 2范小康,何连跃,王晓川,刘晓东,林彬,申彤,宋晓虹.一种基于RBAC模型的角色管理方法[J].计算机研究与发展,2012,49(S1):211-215. 被引量:19
  • 3姜传贤,孙星明,易叶青,杨恒伏.基于JADE算法的数据库公开水印算法的研究[J].系统仿真学报,2006,18(7):1781-1784. 被引量:9
  • 4伍之昂,罗军舟,宋爱波.基于QoS的网格资源管理[J].软件学报,2006,17(11):2264-2276. 被引量:21
  • 5ZHANG Hong,HE YePing,SHI ZhiGuo.A formal model for access control with supporting spatial context[J].Science in China(Series F),2007,50(3):419-439. 被引量:7
  • 6Armbrust M, Fox A, Griffith R. A view of cloud computing[J]. Communications of the ACM, 2010,53(4): 50-58.
  • 7Vaquero L, Rodero L, Caceres J, et al. A break in theclouds: Towards a cloud definition [J]. ACM SIGCOMMComputer Communication Review, 2009,39(1) :-5055.
  • 8Wickremasinghe B,Calheiros R, Buyya R. Cloud analyst : Acloudsim-based visual modeller for analysing cloud computingenvironments and applications [C]//Proc of the 24th IEEEInt Conf onAdvanced Information Networking andApplications (AINA 2010). Piscataway, NJ: IEEE, 2010 :446-452.
  • 9Rodrigo N,Calheiros L, Rajiv R. Cloudsim: A toolkit formodeling and simulation of cloud computing environmentsand evaluation of resource provisioning algorithms [J].Software Practice and Experience(SPE),2011,41(1) : 23-50.
  • 10Tian Guanhua,Meng Dan. Failure rules based node resourceprovision policy for cloud computing [C]//Proc of 2010IEEEInt Symp on IntelligentSignalProcessing. Piscataway, NJ :IEEE, 2010: 397-404.

共引文献849

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部