期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
Multilevel security model for ad hoc networks 被引量:1
1
作者 Wang Changda Ju Shiguang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第2期391-397,F0003,共8页
Modern battlefield doctrine is based on mobility, flexibility, and rapid response to changing situations. As is well known, mobile ad hoc network systems are among the best utilities for battlefield activity. Although... Modern battlefield doctrine is based on mobility, flexibility, and rapid response to changing situations. As is well known, mobile ad hoc network systems are among the best utilities for battlefield activity. Although much research has been done on secure routing, security issues have largely been ignored in applying mobile ad hoc network theory to computer technology. An ad hoc network is usually assumed to be homogeneous, which is an irrational assumption for armies. It is clear that soldiers, commanders, and commanders-in-chief should have different security levels and computation powers as they have access to asymmetric resources. Imitating basic military rank levels in battlefield situations, how multilevel security can be introduced into ad hoc networks is indicated, thereby controlling restricted classified information flows among nodes that have different security levels. 展开更多
关键词 ad hoc network multilevel security model access control.
下载PDF
A Policy Integration Method Based on Multilevel Security for Data Integration
2
作者 WANG Xinming TAN Haoxiang +4 位作者 CHEN Kaijun TANG Hua ZHAO Gansen TANG Yong NIE Ruihua 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2015年第6期483-489,共7页
Integrating and sharing data from different data sources is one of the trends to make better use of data. However, data integration hampers data confidentiality where each data source has its own access control policy... Integrating and sharing data from different data sources is one of the trends to make better use of data. However, data integration hampers data confidentiality where each data source has its own access control policy. This paper includes a discussion on the issue about access control across multiple data sources when they arc combined together in the scenario of searching over these data. A method based on multilevel security for data integration is proposed. The proposed method allows the merging of policies and also tackles the issue of policy conflicts between different data sources. 展开更多
关键词 policy integration multilevel security data integra-tion data confidentiality
原文传递
Enforcing a Source-end Cooperative Multilevel Defense Mechanism to Counter Flooding Attack
3
作者 Saraswathi Shunmuganathan 《Computer Systems Science & Engineering》 SCIE EI 2023年第1期67-79,共13页
The exponential advancement in telecommunication embeds the Internet in every aspect of communication.Interconnections of networks all over the world impose monumental risks on the Internet.A Flooding Attack(FA)is one... The exponential advancement in telecommunication embeds the Internet in every aspect of communication.Interconnections of networks all over the world impose monumental risks on the Internet.A Flooding Attack(FA)is one of the major intimidating risks on the Internet where legitimate users are prevented from accessing network services.Irrespective of the protective measures incorporated in the communication infrastructure,FA still persists due to the lack of global cooperation.Most of the existing mitigation is set up either at the traffic starting point or at the traffic ending point.Providing mitigation at one or the other end may not be a complete solution.To insist on better protection againstflooding attacks,this work proposes a cooperative multilevel defense mechanism.The proposed cooperative multilevel defense mechanism consists of two-level of mitigation.In thefirst level,it is proposed to design a Threshold-based rate-limiting with a Spoofing Resistant Tag(TSRT),as a source end countermeasure for High-Rate Flooding Attacks(HRFA)and spoofing attacks.In the second level,the accent is to discriminate normal traffic after Distributed Denial of Service(DDoS)traffic and drop the DDoS traffic at the destination end.Flow Congruence-based Selective Pushback(FCSP),as a destination-initiated countermeasure for the Low Rate Flooding Attack(LRFA).The source and the destination cooperate to identify and block the attack.A key advantage of this cooperative mechanism is that it can distinguish and channel down the attack traffic nearer to the starting point of the attack.The presentation of the agreeable cooperative multilevel safeguard mechanism is approved through broad recreation in NS-2.The investigation and the exploratory outcomes show that the proposed plan can effectively identify and shield from the attack. 展开更多
关键词 FLOODING SPOOFING cooperative solution multilevel security FILTERING pushback
下载PDF
Integrity Based Access Control Model for Multilevel XML Document
4
作者 洪帆 冯学斌 +1 位作者 黄志 郑明辉 《Journal of Southwest Jiaotong University(English Edition)》 2008年第2期109-114,共6页
XML's increasing popularity highlights the security demand for XML documents. A mandatory access control model for XML document is presented on the basis of investigation of the function dependency of XML documents a... XML's increasing popularity highlights the security demand for XML documents. A mandatory access control model for XML document is presented on the basis of investigation of the function dependency of XML documents and discussion of the integrity properties of multilevel XML document. Then, the algorithms for decomposition/recovery multilevel XML document into/from single level document are given, and the manipulation rules for typical operations of XQuery and XUpdate: QUERY, INSERT, UPDATE, and REMOVE, are elaborated. The multilevel XML document access model can meet the requirement of sensitive information processing application. 展开更多
关键词 XML Access control multilevel security INTEGRITY
下载PDF
STUDY AND IMPROVEMENT OF MLS RELATIONAL DATA MODEL
5
作者 王立松 丁秋林 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2003年第2期236-242,共7页
The conception of multilevel security (MLS) is commonly used in the study of data model for secure database. But there are some limitations in the basic MLS model, such as inference channels. The availability and data... The conception of multilevel security (MLS) is commonly used in the study of data model for secure database. But there are some limitations in the basic MLS model, such as inference channels. The availability and data integrity of the system are seriously constrained by it′s 'No Read Up, No Write Down' property in the basic MLS model. In order to eliminate the covert channels, the polyinstantiation and the cover story are used in the new data model. The read and write rules have been redefined for improving the agility and usability of the system based on the MLS model. All the methods in the improved data model make the system more secure, agile and usable. 展开更多
关键词 data model multilevel secure database covert channels POLYINSTANTIATION cover story
下载PDF
Integrated criteria for covert channel auditing
6
作者 Chang-da WANG Shi-guang JU 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2008年第6期737-743,共7页
A new concept, the security level difference of a covert channel, is presented, which means the security level span from the sender to the receiver of the covert channel. Based on this, the integrated criteria for cov... A new concept, the security level difference of a covert channel, is presented, which means the security level span from the sender to the receiver of the covert channel. Based on this, the integrated criteria for covert channel auditing are given. Whereas TCSEC (Trusted Computer System Evaluation Criteria) or CC (Common Criteria for Information Technology Security Evaluation) only use the bandwidth to evaluate the threat of covert channels, our new criteria integrate the security level difference, the bandwidth sensitive parameter, bandwidth, duration and instantaneous time of covert channels, so as to give a comprehensive evaluation of the threat of covert channels in a multilevel security system. 展开更多
关键词 multilevel security Covert channel Covert channel auditing
下载PDF
A Model of Hierarchical Key Assignment Scheme 被引量:1
7
作者 ZHANG Zhigang ZHAO Jing XU Maozhi 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1597-1600,共4页
A model of the hierarchical key assignment scheme is approached in this paper, which can be used with any cryptography algorithm. Besides, the optimal dynamic control property of a hierarchical key assignment scheme w... A model of the hierarchical key assignment scheme is approached in this paper, which can be used with any cryptography algorithm. Besides, the optimal dynamic control property of a hierarchical key assignment scheme will be defined in this paper. Also, our scheme model will meet this property. 展开更多
关键词 user hierarchy access control key assignment CRYPTOGRAPHY multilevel data security
下载PDF
Responsive hyperbranched poly(formyl-1,2,3-triazole)s toward quadruple-modal information security protection 被引量:1
8
作者 Baixue Li Zhen Li +2 位作者 Kai You Anjun Qin Ben Zhong Tang 《Science China Chemistry》 SCIE EI CSCD 2022年第4期771-777,共7页
Secrecy has received tremendous attention in modern information society. Innovative polymer-based fluorescent materials with multiple mode emission are quite desirable to achieve multistage data security. Herein, a se... Secrecy has received tremendous attention in modern information society. Innovative polymer-based fluorescent materials with multiple mode emission are quite desirable to achieve multistage data security. Herein, a series of soluble and thermally stable hyperbranched poly(formyl-1,2,3-triazole)s(hb-PFTAs) with high molecular weights were facilely prepared by catalyst-free polycycloaddition of aldehyde-activated internal triyne and diazides. Functional moieties of triphenylamine and binaphthyl could be incorporated into the polymers to offer them with unique fluorescence and circular dichroism properties, respectively.By taking advantage of activated ethynyl and aldehyde groups on their peripheries and in the internal branch chains, the hbPFTAs can undergo efficient single-and double-stage post-functionalization. More importantly, based on the remarkable fluorescence responses to hydrazine and hydrochloric acid, the hyperbranched polymers are featured with triple-mode fluorescent patterns and have been applied in quadruple-modal information encryption and storage with enhanced security and density. Collectively, this work not only enriches the structural diversity of the existing triazole-based material library, but also provides new polymeric materials for data and information security application. 展开更多
关键词 activated internal triyne hyperbranched poly(formyl-1 2 3-triazole)s post-polymerization modification multilevel information security
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部