期刊文献+
共找到695篇文章
< 1 2 35 >
每页显示 20 50 100
MTBAC: A Mutual Trust Based Access Control Model in Cloud Computing 被引量:12
1
作者 LIN Guoyuan WANG Danru +1 位作者 BIE Yuyu LEI Min 《China Communications》 SCIE CSCD 2014年第4期154-162,共9页
As a new computing mode,cloud computing can provide users with virtualized and scalable web services,which faced with serious security challenges,however.Access control is one of the most important measures to ensure ... As a new computing mode,cloud computing can provide users with virtualized and scalable web services,which faced with serious security challenges,however.Access control is one of the most important measures to ensure the security of cloud computing.But applying traditional access control model into the Cloud directly could not solve the uncertainty and vulnerability caused by the open conditions of cloud computing.In cloud computing environment,only when the security and reliability of both interaction parties are ensured,data security can be effectively guaranteed during interactions between users and the Cloud.Therefore,building a mutual trust relationship between users and cloud platform is the key to implement new kinds of access control method in cloud computing environment.Combining with Trust Management(TM),a mutual trust based access control(MTBAC) model is proposed in this paper.MTBAC model take both user's behavior trust and cloud services node's credibility into consideration.Trust relationships between users and cloud service nodes are established by mutual trust mechanism.Security problems of access control are solved by implementing MTBAC model into cloud computing environment.Simulation experiments show that MTBAC model can guarantee the interaction between users and cloud service nodes. 展开更多
关键词 cloud computing access control trust model mutual trust mechanism MTBAC
下载PDF
Security analysis of access control model in hybrid cloud based on security entropy 被引量:2
2
作者 车天伟 Ma Jianfeng +1 位作者 Li Na Wang Chao 《High Technology Letters》 EI CAS 2015年第2期200-204,共5页
To resolve the problem of quantitative analysis in hybrid cloud,a quantitative analysis method,which is based on the security entropy,is proposed.Firstly,according to the information theory,the security entropy is put... To resolve the problem of quantitative analysis in hybrid cloud,a quantitative analysis method,which is based on the security entropy,is proposed.Firstly,according to the information theory,the security entropy is put forward to calculate the uncertainty of the system' s determinations on the irregular access behaviors.Secondly,based on the security entropy,security theorems of hybrid cloud are defined.Finally,typical access control models are analyzed by the method,the method's practicability is validated,and security and applicability of these models are compared.Simulation results prove that the proposed method is suitable for the security quantitative analysis of the access control model and evaluation to access control capability in hybrid cloud. 展开更多
关键词 hybrid cloud security entropy classificatory access control model directly unauthorized access right about access indirectly unauthorized access
下载PDF
The Research of Role Tree-Based Access Control Model
3
作者 陆虹 夏天 《Journal of Donghua University(English Edition)》 EI CAS 2010年第2期274-276,共3页
Towards the crossing and coupling permissions in tasks existed widely in many fields and considering the design of role view must rely on the activities of the tasks process,based on Role Based Accessing Control (RBAC... Towards the crossing and coupling permissions in tasks existed widely in many fields and considering the design of role view must rely on the activities of the tasks process,based on Role Based Accessing Control (RBAC) model,this paper put forward a Role Tree-Based Access Control (RTBAC) model. In addition,the model definition and its constraint formal description is also discussed in this paper. RTBAC model is able to realize the dynamic organizing,self-determination and convenience of the design of role view,and guarantee the least role permission when task separating in the mean time. 展开更多
关键词 Role Based accessing control (RBAC) Role Tree-Based access control (RTBAC) models Constraints Permission
下载PDF
Virus spreading in wireless sensor networks with a medium access control mechanism 被引量:4
4
作者 王亚奇 杨晓元 《Chinese Physics B》 SCIE EI CAS CSCD 2013年第4期70-74,共5页
In this paper, an extended version of standard susceptible-infected (SI) model is proposed to consider the influence of a medium access control mechanism on virus spreading in wireless sensor networks. Theoretical a... In this paper, an extended version of standard susceptible-infected (SI) model is proposed to consider the influence of a medium access control mechanism on virus spreading in wireless sensor networks. Theoretical analysis shows that the medium access control mechanism obviously reduces the density of infected nodes in the networks, which has been ignored in previous studies. It is also found that by increasing the network node density or node communication radius greatly increases the number of infected nodes. The theoretical results are confirmed by numerical simulations. 展开更多
关键词 wireless sensor networks medium access control virus spreading susceptible-infected model
下载PDF
A Multi-Tenant Usage Access Model for Cloud Computing 被引量:1
5
作者 Zhengtao Liu Yun Yang +1 位作者 Wen Gu Jinyue Xia 《Computers, Materials & Continua》 SCIE EI 2020年第8期1233-1245,共13页
Most cloud services are built with multi-tenancy which enables data and configuration segregation upon shared infrastructures.It offers tremendous advantages for enterprises and service providers.It is anticipated tha... Most cloud services are built with multi-tenancy which enables data and configuration segregation upon shared infrastructures.It offers tremendous advantages for enterprises and service providers.It is anticipated that this situation will evolve to foster cross-tenant collaboration supported by Authorization as a service.To realize access control in a multi-tenant cloud computing environment,this study proposes a multi-tenant cloud computing access control model based on the traditional usage access control model by building trust relations among tenants.The model consists of three sub-models,which achieve trust relationships between tenants with different granularities and satisfy the requirements of different application scenarios.With an established trust relation in MT-UCON(Multi-tenant Usage Access Control),the trustee can precisely authorize cross-tenant accesses to the trustor’s resources consistent with constraints over the trust relation and other components designated by the trustor.In addition,the security of the model is analyzed by an information flow method.The model adapts to the characteristics of a dynamic and open multi-tenant cloud computing environment and achieves fine-grained access control within and between tenants. 展开更多
关键词 Multi-tenant usage access control model cloud computing
下载PDF
Study on Mandatory Access Control in a Secure Database Management System
6
作者 ZHU Hong, FENG Yu cai School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan 430074, China 《Journal of Shanghai University(English Edition)》 CAS 2001年第4期299-307,共9页
This paper proposes a security policy model for mandatory access control in class B1 database management system whose level of labeling is tuple. The relation hierarchical data model is extended to multilevel relatio... This paper proposes a security policy model for mandatory access control in class B1 database management system whose level of labeling is tuple. The relation hierarchical data model is extended to multilevel relation hierarchical data model. Based on the multilevel relation hierarchical data model, the concept of upper lower layer relational integrity is presented after we analyze and eliminate the covert channels caused by the database integrity. Two SQL statements are extended to process polyinstantiation in the multilevel secure environment. The system is based on the multilevel relation hierarchical data model and is capable of integratively storing and manipulating multilevel complicated objects ( e.g., multilevel spatial data) and multilevel conventional data ( e.g., integer, real number and character string). 展开更多
关键词 multilevel relation hierarchical data model covert channels mandatory access control POLYINSTANTIATION hierarchical classification non hierarchical category security level multilevel relation hierarchical instance INTEGRITY cluster
下载PDF
Experience-Based Access Control in UbiComp: A New Paradigm
7
作者 Nalini A. Mhetre Arvind V. Deshpande Parikshit N. Mahalle 《Journal of Computer and Communications》 2022年第1期133-157,共25页
Experience is a sociological concept and builds over time. In a broader sense, the human-centered equivalents of experience and trust apply to D2D interaction. Ubiquitous computing (UbiComp) embeds intelligence and co... Experience is a sociological concept and builds over time. In a broader sense, the human-centered equivalents of experience and trust apply to D2D interaction. Ubiquitous computing (UbiComp) embeds intelligence and computing capabilities in everyday objects to make them effectively communicate, share resources, and perform useful tasks. The safety of resources is a serious problem. As a result, authorization and access control in UbiComp is a significant challenge. Our work presents experience as an outcome of history (HI), reliability (RL), transitivity (TR), and Ubiquity (UB). This experience model is easily adaptable to a variety of self-regulating context-aware access control systems. This paper proposes a framework for Experience-Based Access Control (EX-BAC) with all major services provided by the model. EX-BAC extends attribute-based access control. It uses logical device type and experience as context parameters for policy design. When compared with the state-of-the-art, EX-BAC is efficient with respect to response time. 展开更多
关键词 access control Experience-Based access control Experience model History Reliability TRANSITIVITY Ubiquitous Computing Ubiquity
下载PDF
Mobility Conscious Medium Access Control Scheme for Wireless Sensor Networks: A Conceptual Approach
8
作者 Adeniran Ishola Oluwaranti Tayo Dorcas Obasanya 《Wireless Sensor Network》 2014年第7期129-135,共7页
Mobility in Wireless Sensor Network (WSN) presents distinctive challenges in Medium Access Control (MAC) scheme. Numerous MAC protocols for sensor networks assume that sensor nodes are static and focus primarily on en... Mobility in Wireless Sensor Network (WSN) presents distinctive challenges in Medium Access Control (MAC) scheme. Numerous MAC protocols for sensor networks assume that sensor nodes are static and focus primarily on energy efficiency. This work seeks to develop an improved mobility conscious medium access control scheme for wireless sensor networks with a view to enhance energy conservation on mobile sensor nodes. On this note, mobility patterns of different scenarios are modelled using Gauss Markov Mobility Model (GMMM) to determine the position and distance of the sensor nodes and how they are correlated in time. 展开更多
关键词 MOBILITY Medium access control Wireless Sensor Networks GAUSS MARKOV MOBILITY model
下载PDF
Multilevel security model for ad hoc networks 被引量:1
9
作者 Wang Changda Ju Shiguang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第2期391-397,F0003,共8页
Modern battlefield doctrine is based on mobility, flexibility, and rapid response to changing situations. As is well known, mobile ad hoc network systems are among the best utilities for battlefield activity. Although... Modern battlefield doctrine is based on mobility, flexibility, and rapid response to changing situations. As is well known, mobile ad hoc network systems are among the best utilities for battlefield activity. Although much research has been done on secure routing, security issues have largely been ignored in applying mobile ad hoc network theory to computer technology. An ad hoc network is usually assumed to be homogeneous, which is an irrational assumption for armies. It is clear that soldiers, commanders, and commanders-in-chief should have different security levels and computation powers as they have access to asymmetric resources. Imitating basic military rank levels in battlefield situations, how multilevel security can be introduced into ad hoc networks is indicated, thereby controlling restricted classified information flows among nodes that have different security levels. 展开更多
关键词 ad hoc network multilevel security model access control.
下载PDF
NOVEL MULTIMEDIA TRAFFIC MODELING BASED CAC SCHEME FOR CDMA COMMUNICATION SYSTEMS 被引量:2
10
作者 Zhang Dandan Fang Xuming Zhu Longjie 《Journal of Electronics(China)》 2007年第1期39-45,共7页
As the radio spectrum is a very scarce resource,the Call Admission Control (CAC) is one of the most important parts in radio resource management. The Code Division Multiple Access (CDMA) based next generation wireless... As the radio spectrum is a very scarce resource,the Call Admission Control (CAC) is one of the most important parts in radio resource management. The Code Division Multiple Access (CDMA) based next generation wireless communications systems will support the transmission of multimedia traffic,such as voice,video and data,thus the CAC,which can support the multimedia traffic and guarantee the Quality of Service (QoS) of different traffic,has gained broad attention. In this paper,a novel multimedia traffic modeling method and a corresponding dynamic QoS based CAC are proposed. The analysis and simulation results show that the proposed CAC scheme can guarantee the QoS to different traffic demand,and improve the system performance significantly. 展开更多
关键词 Call Admission control (CAC) Traffic modeling Code Division Multiple access (CDMA) Signal-to-Interference Ratio (SIR) Quality of Service (QoS)
下载PDF
Analysis and Application for Integrity Model on Trusted Platform
11
作者 TUGuo-qing ZHANGHuan-guo WANGLi-na YUDan-dan 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期35-38,共4页
To build a trusted platform based on Trusted Computing Platform Alliance(TCPA)' s recommendation, we analyze the integrity mechanism for such a PC platfoim in this paper.By combinning access control model with inf... To build a trusted platform based on Trusted Computing Platform Alliance(TCPA)' s recommendation, we analyze the integrity mechanism for such a PC platfoim in this paper.By combinning access control model with information flow model, we put forwarda combinedprocess-based lattice model to enforce security This moelel creates a trust chain by which we canmanage a series of processes from a core root of trust module to some other application modules Inthe model, once the trust chain is created andmanaged cor-rectly, the integrity of the computer'shardware and sofware has bctn maintained, so does the confidentiality and authenticity. Moreover, arelevant implementation of the model is explained. 展开更多
关键词 tiusted computing access control model information flow model trust chain INTEGRITY
下载PDF
A Multilevel Secure Relation-Hierarchical Data Model for a Secure DBMS
12
作者 朱虹 冯玉才 《Journal of Modern Transportation》 2001年第1期8-16,共9页
A multilevel secure relation hierarchical data model for multilevel secure database is extended from the relation hierarchical data model in single level environment in this paper. Based on the model, an upper lowe... A multilevel secure relation hierarchical data model for multilevel secure database is extended from the relation hierarchical data model in single level environment in this paper. Based on the model, an upper lower layer relationalintegrity is presented after we analyze and eliminate the covert channels caused by the database integrity.Two SQL statements are extended to process polyinstantiation in the multilevel secure environment.The system based on the multilevel secure relation hierarchical data model is capable of integratively storing and manipulating complicated objects ( e.g. , multilevel spatial data) and conventional data ( e.g. , integer, real number and character string) in multilevel secure database. 展开更多
关键词 DATABASES data structure data models secure DBMS covert channels mandatory access control POLYINSTANTIATION hierarchical classification non hierarchical category security level integrity cluster index
下载PDF
A Lattice Model on P2P Based on Trust and Role
13
作者 Yihe Liu 《通讯和计算机(中英文版)》 2010年第1期46-50,共5页
关键词 P2P网络 格子模型 信任度 基于角色的访问控制 信息安全模型 RBAC 晶格模型 信息流
下载PDF
零信任的安全模型研究
14
作者 高能 彭佳 王识潇 《信息安全研究》 CSCD 北大核心 2024年第10期886-895,共10页
零信任被认为是一种新的安全范式,从安全模型视角,揭示了零信任架构以“身份和数据”为主线的安全模型深化与整合.零信任以身份为核心建立全景管控实体链条,围绕实体属性功能生命周期等建立深度防御,并集中重定向实体间信息的流动,整合... 零信任被认为是一种新的安全范式,从安全模型视角,揭示了零信任架构以“身份和数据”为主线的安全模型深化与整合.零信任以身份为核心建立全景管控实体链条,围绕实体属性功能生命周期等建立深度防御,并集中重定向实体间信息的流动,整合信息通道,实现层层防护和细粒度动态化访问控制,最后从攻击者视角在信息流通道关键节点设置主动防御机制.由于零信任系统一定会成为高价值资产,探讨了零信任系统演进中与业务深度融合、零信任自身安全和弹性服务能力的新趋势.通过对零信任蕴含安全模型和自身安全性的分析,期望能够为零信任在应用中的架构设计、技术演进、应用安全提供更加清晰的技术发展路径. 展开更多
关键词 零信任 安全模型 身份信任模型 深度防御 访问控制 弹性化
下载PDF
基于策略的动态角色分配模型及应用
15
作者 冯骐 马晨辉 《计算机与数字工程》 2024年第1期75-80,共6页
访问控制是应用系统中的重要问题之一。传统的基于角色的访问控制(RBAC)方案需要预先定义和同步用户-角色赋值关系,这会带来管理成本和同步开销,并且限制了应用系统的灵活性和动态性。文章提出一种基于策略的动态角色分配模型(Policy-ba... 访问控制是应用系统中的重要问题之一。传统的基于角色的访问控制(RBAC)方案需要预先定义和同步用户-角色赋值关系,这会带来管理成本和同步开销,并且限制了应用系统的灵活性和动态性。文章提出一种基于策略的动态角色分配模型(Policy-based Dynamic Role Assignment Model——PDRA),它无需同步用户就可以自定义角色,并通过策略匹配的方式实现动态分配。模型完全兼容RBAC,可以成为RBAC良好的扩展机制。文章给出了模型的定义和算法,评估了模型的性能,并在华东师范大学的数据治理平台中进行了应用,验证了该方案的可行性和有效性。 展开更多
关键词 访问控制 基于角色的访问控制 基于策略的动态角色分配模型 策略匹配算法 数据治理平台
下载PDF
基于RBAC模型的前后端分离系统设计与实现 被引量:2
16
作者 陈海锋 丘美玲 《科技创新与应用》 2024年第4期102-105,109,共5页
权限管理是现代信息管理系统核心功能之一,能够让用户可以安全访问系统数据,其中基于角色的访问控制模型是常用的一种权限管理模型,其优点是能够灵活地处理角色与权限之间的变化问题,为复杂的权限管理问题提供便利性。另一方面前后端分... 权限管理是现代信息管理系统核心功能之一,能够让用户可以安全访问系统数据,其中基于角色的访问控制模型是常用的一种权限管理模型,其优点是能够灵活地处理角色与权限之间的变化问题,为复杂的权限管理问题提供便利性。另一方面前后端分离技术能够很好地解决前端页面开发和后端服务器功能开发解耦的问题,让分工双方更加注重各自面对的业务问题,减少对开发人员技术门槛的要求,从而大大提高了开发效率。因此采用前后端分离技术实现通用的基于角色的访问控制系统具有一定的实用价值。 展开更多
关键词 基于角色的访问控制模型 前后端分离 访问控制 系统设计 数据库
下载PDF
统一驱动与能力抽象结合的无人机载荷虚拟化方法及实现
17
作者 李晓娟 周兴社 +2 位作者 张羽 姚远 杨刚 《西北工业大学学报》 EI CAS CSCD 北大核心 2024年第3期406-416,共11页
随着无人机及其集群应用不断深入并日益广泛,无人机载荷呈现种类多样、形态异构、接口复杂等特点,但同时要求系统能快速接入并高效管理载荷。为了解耦无人机载荷与系统平台的紧密关系,扩展对异构载荷的兼容能力,提出一种新型的载荷设备... 随着无人机及其集群应用不断深入并日益广泛,无人机载荷呈现种类多样、形态异构、接口复杂等特点,但同时要求系统能快速接入并高效管理载荷。为了解耦无人机载荷与系统平台的紧密关系,扩展对异构载荷的兼容能力,提出一种新型的载荷设备虚拟化方法。提出分层驱动模型,实现载荷硬件设备和驱动软件的解耦,使载荷设备接入过程标准化,该模型通过软硬件协同实现;提出基于“能力”的载荷抽象,解耦载荷应用功能及其设备实体;给出了载荷虚拟化方法具体实现及其典型验证实例。上述载荷设备虚拟化方法通过载荷应用、载荷驱动及载荷设备的软硬件解耦,增强了系统接入不同载荷的兼容性及扩展性,提高了统一管理多种载荷的效率。 展开更多
关键词 无人机载荷 虚拟化 标准化接入 能力抽象 软硬件融合
下载PDF
数字技术使用、绿色认知与农户绿色防控技术采纳——以晋冀两省梨种植户为例 被引量:1
18
作者 卫佳静 郑少锋 张青松 《世界农业》 CSSCI 2024年第3期99-112,共14页
在数字乡村建设有序推进的背景下,明晰数字技术对农户绿色防控技术采纳的影响,对推进农业高质量发展意义重大。本文依据晋冀两省1 332份梨种植户调查数据,运用内生转换回归模型实证检验以数字技术接入和数字技术三个维度功能使用(信息... 在数字乡村建设有序推进的背景下,明晰数字技术对农户绿色防控技术采纳的影响,对推进农业高质量发展意义重大。本文依据晋冀两省1 332份梨种植户调查数据,运用内生转换回归模型实证检验以数字技术接入和数字技术三个维度功能使用(信息查询、信息交流及网络销售)为表征的数字技术使用对农户绿色防控技术采纳的影响效应,并运用中介效应模型深入分析绿色认知在其中的作用路径。结果表明:(1)数字技术接入和数字技术功能使用均显著促进农户绿色防控技术采纳,且功能使用影响效应更大。(2)数字技术功能使用引致的农户绿色防控技术采纳提升效应大小依次为网络销售>信息交流>信息查询。(3)机制分析表明,农户绿色认知在数字技术接入对其绿色防控技术采纳影响中未发挥中介作用,而在数字技术功能使用对其绿色防控技术采纳影响中发挥中介作用,且中介效应大小依次为信息查询>信息交流>网络销售。(4)异质性分析表明,数字技术功能使用程度越深,对农户采纳绿色防控技术的提升效果越大。据此,建议扩大数字基础设施有效覆盖,全面提升农户数字技能;推动农户数字技术功能使用纵深发展;加强绿色农业生产宣传教育,提升农户绿色认知。 展开更多
关键词 数字技术接入 数字技术功能使用 绿色认知 绿色防控技术 内生转换回归模型
下载PDF
Specification and Verification of a Topology-Aware Access Control Model for Cyber-Physical Space 被引量:4
19
作者 Yan Cao Zhiqiu Huang +2 位作者 Shuanglong Kan Dajuan Fan Yang Yang 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2019年第5期497-519,共23页
The cyber-physical space is a spatial environment that integrates the cyber and physical worlds to provide an intelligent environment for users to conduct their day-to-day activities. Mobile users and mobile objects a... The cyber-physical space is a spatial environment that integrates the cyber and physical worlds to provide an intelligent environment for users to conduct their day-to-day activities. Mobile users and mobile objects are ubiquitous in this space, thereby exerting tremendous pressure on its security model. This model must ensure that both cyber and physical objects are always handled securely in this dynamic environment. In this paper,we propose a systematic solution to be able to specify security policies of the cyber-physical space and ensure that security requirements hold in these policies. We first formulate a topology configuration model to capture the topology characteristics of the cyber and physical worlds. Then, based on this model, a Topology-Aware CyberPhysical Access Control model(TA-CPAC) is proposed, which can ensure the security of the cyber and physical worlds at the same time by adjusting permission assignment dynamically. Then, the topology configuration and TA-CPAC models are formalized by bigraphs and Bigraph Reactive System(BRS), respectively, allowing us to use model checking to rationalize the consequences of the evolution of topological configurations on the satisfaction of security requirements. Finally, a case study on a building automation access control system is conducted to evaluate the effectiveness of the proposed approach. 展开更多
关键词 cyber-physical space TOPOLOGY CONFIGURATION access control model CHECKING bigraphs
原文传递
Tenant-based access control model for multi-tenancy and sub-tenancy architecture in Software-as-a-Service 被引量:3
20
作者 Qiong zuo Meiyi XIE +1 位作者 Guanqiu QI Hong ZHU 《Frontiers of Computer Science》 SCIE EI CSCD 2017年第3期465-484,共20页
Software-as-a-Service (SaaS) introduces multi- tenancy architecture (MTA). Sub-tenancy architecture (STA), is an extension of MTA, allows tenants to offer services for subtenant developers to customize their app... Software-as-a-Service (SaaS) introduces multi- tenancy architecture (MTA). Sub-tenancy architecture (STA), is an extension of MTA, allows tenants to offer services for subtenant developers to customize their applications in the SaaS infrastructure. In a STA system, tenants can create sub- tenants, and grant their resources (including private services and data) to their subtenants. The isolation and sharing re- lations between parent-child tenants, sibling tenants or two non-related tenants are more complicated than those between tenants in MTA. It is important to keep service components or data private, and at the same time, allow them to be shared, and support application customizations for tenants. To ad- dress this problem, this paper provides a formal definition of a new tenant-based access control model based on administra- tive role-based access control (ARBAC) for MTA and STA in service-oriented SaaS (called TMS-ARBAC). Autonomous areas (AA) and AA-tree are proposed to describe the auton- omy of tenants, including their isolation and sharing relation- ships. Authorization operations on AA and different resource sharing strategies are defined to create and deploy the access control scheme in STA models. TMS-ARBAC model is ap- plied to design a geographic e-Science platform. 展开更多
关键词 Software-as-a-Service (SaaS) multi-tenancy architecture (MTA) sub-tenancy architecture (STA) rolebased access control (RBAC) model tenant-based access control model
原文传递
上一页 1 2 35 下一页 到第
使用帮助 返回顶部