STUDY ON THE MODELING AND ANALYZING OF THE ROLE-BASED THREATS IN THE CYBERSPACE

被引:0
|
作者
Hao, Yeli [1 ]
Guo, Shize [1 ]
Zhao, Hong [1 ]
Chen, Zhe [1 ]
机构
[1] Grad Univ Chinese Acad Sci, Sch Management, Beijing 100049, Peoples R China
基金
中国国家自然科学基金;
关键词
Cybersapce; Bipartite network; One-mode projection; Role-based; Multi-level;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The modeling of the cyberspace and the analyzing of the threats in the cyberspace are both the innovational aspects in the area of defense space. The multi-networks, multi-subsystems, multi-roles and multi-level-threats of the cyberspace cause the nonlinearity and the indefiniteness of it which makes it difficult for us to represent, model and analyze the threat of it. This paper is focused on the study of the building the model of the cyberspace from the view of the roles. Considering the construction of the cyberspace and the actors in the cyberspace being multi-networks and multi-roles, we construct the cyberspace bipartite network to describe the original pattern of connections of it. Then we perform two projections onto the actors and roles separately and construct the actor-network and the role-network based on the cyberspace bipartite network. To analyze the multi-level threats formally, the paper uses the case theory to establish the role-based multi-level threats model called RBT. The article also proposes the methodology using the RBT model to analyze the role-based multi-level threats in the cyberspace formally and effectively.
引用
收藏
页码:1302 / 1306
页数:5
相关论文
共 50 条
  • [1] Analyzing and managing role-based access control policies
    Sohr, Karsten
    Drouineaud, Michael
    Ahn, Gail-Joon
    Gogolla, Martin
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2008, 20 (07) : 924 - 939
  • [2] Composite role-based monitoring (CRBM) for countering insider threats
    Park, JS
    Ho, SM
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2004, 3073 : 201 - 213
  • [3] Modeling role-based agent team
    Zhang, Yu
    Advances in Artificial Intelligence, 2007, 4509 : 1 - 13
  • [4] A role-based modeling for agent teams
    Zhang, Yu
    Yin, Jianwen
    DIS 2006: IEEE WORKSHOP ON DISTRIBUTED INTELLIGENT SYSTEMS: COLLECTIVE INTELLIGENCE AND ITS APPLICATIONS, PROCEEDINGS, 2006, : 348 - +
  • [5] Analyzing Quality Criteria in Role-based Identity and Access Management
    Kunz, Michael
    Fuchs, Ludwig
    Netter, Michael
    Pernul, Guenther
    2015 INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2015, : 64 - 72
  • [6] Role-Based Access Control Modeling and Validation
    Haraty, Ramzi A.
    Naous, Mirna
    2013 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2013,
  • [7] A Role-Based Business Process Modeling Methodology
    Wang, Leizhen
    Wang, Dingwei
    CCDC 2009: 21ST CHINESE CONTROL AND DECISION CONFERENCE, VOLS 1-6, PROCEEDINGS, 2009, : 4881 - +
  • [8] Contextual and Relational Role-Based Modeling Framework
    Kuehn, Thomas
    Werner, Christopher
    Schoen, Hendrik
    Zhao Zhenxi
    Assmann, Uwe
    2019 45TH EUROMICRO CONFERENCE ON SOFTWARE ENGINEERING AND ADVANCED APPLICATIONS (SEAA 2019), 2019, : 442 - 449
  • [9] Study of Role-based Access Control
    Cao Yonghui
    EBM 2010: INTERNATIONAL CONFERENCE ON ENGINEERING AND BUSINESS MANAGEMENT, VOLS 1-8, 2010, : 5209 - 5212
  • [10] Analyzing temporal patterns of knowledge construction in a role-based online discussion
    Wise, Alyssa Friend
    Chiu, Ming Ming
    INTERNATIONAL JOURNAL OF COMPUTER-SUPPORTED COLLABORATIVE LEARNING, 2011, 6 (03) : 445 - 470