Big data technologies have seen tremendous growth in recent years. They are widely used in both industry and academia. In spite of such exponential growth, these technologies lack adequate measures to protect data fro...Big data technologies have seen tremendous growth in recent years. They are widely used in both industry and academia. In spite of such exponential growth, these technologies lack adequate measures to protect data from misnse/abuse. Corporations that collect data from multiple sources are at risk of liabilities due to the exposure of sensitive information. In the current implementation of Hadoop, only file-level access control is feasible. Providing users with the ability to access data based on the attlibutes in a dataset or the user's role is complicated because of the sheer volume and multiple formats (structured, unstructured and semi-structured) of data. In this paper, we propose an access control framework, which enforces access control policies dynamically based on the sensitivity of the data. This framework enforces access control policies by harnessing the data context, usage patterns and informat/on sensitivity. Information sensitivity changes over time with the addition and removal of datasets, which can lead to modifications in access control decisions. The proposed framework accommodates these changes. The proposed framework is automated to a large extent as the data itself determines the sensitivity with minimal user intervention. Our experimental results show that the proposed framework is capable of enforcing access control policies on non-multimedia datasets with minimal overhead.展开更多
DAC (Discretionary Access Control Policy) is access control based on ownership relations between subject and object, the subject can discretionarily decide on that who, by what methods, can access his owns object. I...DAC (Discretionary Access Control Policy) is access control based on ownership relations between subject and object, the subject can discretionarily decide on that who, by what methods, can access his owns object. In this paper, the system time is looked as a basic secure element. The DAC_T (Discretionary Access Control Policy with Time Character) is presented and formalized. The DAC_T resolves that the subject can discretionarily decide that who, on when, can access his owns objects. And then the DAC_T is implemented on Linux based on GFAC (General Framework for Access Control), and the algorithm is put forward. Finally, the performance analysis for the DAC T Linux is carried out. It is proved that the DAC T Linux not only can realize time constraints between subject and object but also can still be accepted by us though its performance have been decreased.展开更多
This paper deals with the co-design problem of event-triggered communication scheduling and platooning control over vehicular ad-hoc networks(VANETs)subject to finite communication resource.First,a unified model is pr...This paper deals with the co-design problem of event-triggered communication scheduling and platooning control over vehicular ad-hoc networks(VANETs)subject to finite communication resource.First,a unified model is presented to describe the coordinated platoon behavior of leader-follower vehicles in the simultaneous presence of unknown external disturbances and an unknown leader control input.Under such a platoon model,the central aim is to achieve robust platoon formation tracking with desired inter-vehicle spacing and same velocities and accelerations guided by the leader,while attaining improved communication efficiency.Toward this aim,a novel bandwidth-aware dynamic event-triggered scheduling mechanism is developed.One salient feature of the scheduling mechanism is that the threshold parameter in the triggering law is dynamically adjusted over time based on both vehicular state variations and bandwidth status.Then,a sufficient condition for platoon control system stability and performance analysis as well as a co-design criterion of the admissible event-triggered platooning control law and the desired scheduling mechanism are derived.Finally,simulation results are provided to substantiate the effectiveness and merits of the proposed co-design approach for guaranteeing a trade-off between robust platooning control performance and communication efficiency.展开更多
Flume, which implements decentralized information flow control (DIFC), allows a high security level process to "pre-create" secret files in a low security level directory. However, the pre-create mechanism makes s...Flume, which implements decentralized information flow control (DIFC), allows a high security level process to "pre-create" secret files in a low security level directory. However, the pre-create mechanism makes some normal system calls unavailable, and moreover, it needs priori knowledge to create a large quantity of objects, which is difficult to estimate in practical operating systems. In this paper, we present an extended Flume file access control mechanism, named Effect, to substitute the mechanism of pre-create, which permits write operations (create, delete, and rename a file) on directories and creates a file access virtual layer that allocates operational views for each process with noninterference properties. In the end, we further present an analysis on the security of Effect. Our work makes it easier for multi-user to share confidential information in decentralized information flow control systems.展开更多
The large carrier frequency shift caused by the high-speed movement of satellite (Doppler effects) and the propagation delay on the up-down link are very critical issues in an LEO satellite communication system, which...The large carrier frequency shift caused by the high-speed movement of satellite (Doppler effects) and the propagation delay on the up-down link are very critical issues in an LEO satellite communication system, which affects both the selection and the implementation of a suitable access method. A Doppler based multiple access technique is used here to control the flow and an MPRMA-HS protocol is proposed for the application in LEO satellite communication systems. The extended simulation trials prove that the proposed scheme seems to be a very promising access method.展开更多
该文基于信息系统物理化的设想提出电力信息物理系统(cyber-physical power system,CPPS)中的信息流建模和计算分析方法。采用连续时间函数来刻画信息流的特征,并定义信息网络运行参数为流量累积函数、信息流速和时延。首先,基于遍历法...该文基于信息系统物理化的设想提出电力信息物理系统(cyber-physical power system,CPPS)中的信息流建模和计算分析方法。采用连续时间函数来刻画信息流的特征,并定义信息网络运行参数为流量累积函数、信息流速和时延。首先,基于遍历法搜索出信息流路径,建立信息流速矩阵的范式;然后利用改进的网络演算(network calculus,NC)特性赋值流速矩阵的元素;进一步采用流量累积函数表征信源数据发送规律,从而显式求解时延上界。最后将提出的信息流建模方法应用于智能变电站自动化系统的时延计算,通过与OPNET的仿真结果相比较,验证所提出模型的有效性,而且该方法可以提供定量分析指标以优化变电站组网方案设计中的信息流分布。展开更多
为保障铁路系统的信息安全,文章提出一种铁路运行环境下可信根实体(Entity of Root of Trust,ERT)的软件化技术,在内核中实现强制访问控制功能,通过操作系统内核的修改或扩展,实现更为细粒度和强大的权限管理。同时考虑到轻量级场景下...为保障铁路系统的信息安全,文章提出一种铁路运行环境下可信根实体(Entity of Root of Trust,ERT)的软件化技术,在内核中实现强制访问控制功能,通过操作系统内核的修改或扩展,实现更为细粒度和强大的权限管理。同时考虑到轻量级场景下部分设备存在计算能力弱、存储空间有限和电源供应不稳定等问题,提出一种轻量级可信计算体系,最大程度满足可信计算要求。通过实施内核级的强制访问控制和轻量级的可信计算体系改造,缓解未知风险对关键信息基础设施的威胁,为铁路系统的安全性提供保障。展开更多
Out-of-step oscillation is a very destructive physical phenomenon in power system, which could directly cause big blackout accompanied by serious sociology-economic impacts. Out-of-step splitting control is an indispe...Out-of-step oscillation is a very destructive physical phenomenon in power system, which could directly cause big blackout accompanied by serious sociology-economic impacts. Out-of-step splitting control is an indispensable means, which could protect the system from major shocks of out-of-step oscillation. After years of development, it has achieved certain amount of research results. Have the existing methods been able to meet the requirements of out-of-step splitting? What improvements are needed? Under this background, this review is written. It combs the development of out-of-step splitting control technologies and analyzes the technical routes and characteristics of different methods. It points out the contradiction between rapidity and optimality is the biggest technical problem, existing in both the traditional local measurement based out-of-step splitting protection and the wide-area information based out-of-step splitting protection. It further points out that the advantages of the two types of protections can be combined with the unique physical characteristics of the out-of-step center to form a more advantageous splitting strategy. Besides, facing the fact of large-scale renewable energy access to power grid in recent years, this review also analyzes the challenges brought by it and provides some corresponding suggestions. It is hoped to provide some guidance for the subsequent research work.展开更多
文摘Big data technologies have seen tremendous growth in recent years. They are widely used in both industry and academia. In spite of such exponential growth, these technologies lack adequate measures to protect data from misnse/abuse. Corporations that collect data from multiple sources are at risk of liabilities due to the exposure of sensitive information. In the current implementation of Hadoop, only file-level access control is feasible. Providing users with the ability to access data based on the attlibutes in a dataset or the user's role is complicated because of the sheer volume and multiple formats (structured, unstructured and semi-structured) of data. In this paper, we propose an access control framework, which enforces access control policies dynamically based on the sensitivity of the data. This framework enforces access control policies by harnessing the data context, usage patterns and informat/on sensitivity. Information sensitivity changes over time with the addition and removal of datasets, which can lead to modifications in access control decisions. The proposed framework accommodates these changes. The proposed framework is automated to a large extent as the data itself determines the sensitivity with minimal user intervention. Our experimental results show that the proposed framework is capable of enforcing access control policies on non-multimedia datasets with minimal overhead.
基金Supported by the National 863 Broad Band VPN Project (No.863-104-03-01)
文摘DAC (Discretionary Access Control Policy) is access control based on ownership relations between subject and object, the subject can discretionarily decide on that who, by what methods, can access his owns object. In this paper, the system time is looked as a basic secure element. The DAC_T (Discretionary Access Control Policy with Time Character) is presented and formalized. The DAC_T resolves that the subject can discretionarily decide that who, on when, can access his owns objects. And then the DAC_T is implemented on Linux based on GFAC (General Framework for Access Control), and the algorithm is put forward. Finally, the performance analysis for the DAC T Linux is carried out. It is proved that the DAC T Linux not only can realize time constraints between subject and object but also can still be accepted by us though its performance have been decreased.
基金This work was supported in part by the Australian Research Council Discovery Early Career Researcher Award under Grant DE200101128.
文摘This paper deals with the co-design problem of event-triggered communication scheduling and platooning control over vehicular ad-hoc networks(VANETs)subject to finite communication resource.First,a unified model is presented to describe the coordinated platoon behavior of leader-follower vehicles in the simultaneous presence of unknown external disturbances and an unknown leader control input.Under such a platoon model,the central aim is to achieve robust platoon formation tracking with desired inter-vehicle spacing and same velocities and accelerations guided by the leader,while attaining improved communication efficiency.Toward this aim,a novel bandwidth-aware dynamic event-triggered scheduling mechanism is developed.One salient feature of the scheduling mechanism is that the threshold parameter in the triggering law is dynamically adjusted over time based on both vehicular state variations and bandwidth status.Then,a sufficient condition for platoon control system stability and performance analysis as well as a co-design criterion of the admissible event-triggered platooning control law and the desired scheduling mechanism are derived.Finally,simulation results are provided to substantiate the effectiveness and merits of the proposed co-design approach for guaranteeing a trade-off between robust platooning control performance and communication efficiency.
基金Supported by the National Natural Science Foundation of China(61003268,61103220,91118003,61173138,61170022)Hubei Provincial Natural Science Foundation(2010CDB08601)The Fundamental ResearchFunds for the Central Universities (3101038,274629)
文摘Flume, which implements decentralized information flow control (DIFC), allows a high security level process to "pre-create" secret files in a low security level directory. However, the pre-create mechanism makes some normal system calls unavailable, and moreover, it needs priori knowledge to create a large quantity of objects, which is difficult to estimate in practical operating systems. In this paper, we present an extended Flume file access control mechanism, named Effect, to substitute the mechanism of pre-create, which permits write operations (create, delete, and rename a file) on directories and creates a file access virtual layer that allocates operational views for each process with noninterference properties. In the end, we further present an analysis on the security of Effect. Our work makes it easier for multi-user to share confidential information in decentralized information flow control systems.
基金This project was supported by National "863" High Technology Research and Development Program of China (863-2-5-2.1).
文摘The large carrier frequency shift caused by the high-speed movement of satellite (Doppler effects) and the propagation delay on the up-down link are very critical issues in an LEO satellite communication system, which affects both the selection and the implementation of a suitable access method. A Doppler based multiple access technique is used here to control the flow and an MPRMA-HS protocol is proposed for the application in LEO satellite communication systems. The extended simulation trials prove that the proposed scheme seems to be a very promising access method.
文摘该文基于信息系统物理化的设想提出电力信息物理系统(cyber-physical power system,CPPS)中的信息流建模和计算分析方法。采用连续时间函数来刻画信息流的特征,并定义信息网络运行参数为流量累积函数、信息流速和时延。首先,基于遍历法搜索出信息流路径,建立信息流速矩阵的范式;然后利用改进的网络演算(network calculus,NC)特性赋值流速矩阵的元素;进一步采用流量累积函数表征信源数据发送规律,从而显式求解时延上界。最后将提出的信息流建模方法应用于智能变电站自动化系统的时延计算,通过与OPNET的仿真结果相比较,验证所提出模型的有效性,而且该方法可以提供定量分析指标以优化变电站组网方案设计中的信息流分布。
文摘为保障铁路系统的信息安全,文章提出一种铁路运行环境下可信根实体(Entity of Root of Trust,ERT)的软件化技术,在内核中实现强制访问控制功能,通过操作系统内核的修改或扩展,实现更为细粒度和强大的权限管理。同时考虑到轻量级场景下部分设备存在计算能力弱、存储空间有限和电源供应不稳定等问题,提出一种轻量级可信计算体系,最大程度满足可信计算要求。通过实施内核级的强制访问控制和轻量级的可信计算体系改造,缓解未知风险对关键信息基础设施的威胁,为铁路系统的安全性提供保障。
基金supported by the National Natural Science Foundation of China(Grant No.62273207,61821004,62350083,62192755)the Future Young Scholars Program of Shandong University,China.
文摘Out-of-step oscillation is a very destructive physical phenomenon in power system, which could directly cause big blackout accompanied by serious sociology-economic impacts. Out-of-step splitting control is an indispensable means, which could protect the system from major shocks of out-of-step oscillation. After years of development, it has achieved certain amount of research results. Have the existing methods been able to meet the requirements of out-of-step splitting? What improvements are needed? Under this background, this review is written. It combs the development of out-of-step splitting control technologies and analyzes the technical routes and characteristics of different methods. It points out the contradiction between rapidity and optimality is the biggest technical problem, existing in both the traditional local measurement based out-of-step splitting protection and the wide-area information based out-of-step splitting protection. It further points out that the advantages of the two types of protections can be combined with the unique physical characteristics of the out-of-step center to form a more advantageous splitting strategy. Besides, facing the fact of large-scale renewable energy access to power grid in recent years, this review also analyzes the challenges brought by it and provides some corresponding suggestions. It is hoped to provide some guidance for the subsequent research work.