STUDY ON THE MODELING AND ANALYZING OF THE ROLE-BASED THREATS IN THE CYBERSPACE

被引:0
|
作者
Hao, Yeli [1 ]
Guo, Shize [1 ]
Zhao, Hong [1 ]
Chen, Zhe [1 ]
机构
[1] Grad Univ Chinese Acad Sci, Sch Management, Beijing 100049, Peoples R China
基金
中国国家自然科学基金;
关键词
Cybersapce; Bipartite network; One-mode projection; Role-based; Multi-level;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The modeling of the cyberspace and the analyzing of the threats in the cyberspace are both the innovational aspects in the area of defense space. The multi-networks, multi-subsystems, multi-roles and multi-level-threats of the cyberspace cause the nonlinearity and the indefiniteness of it which makes it difficult for us to represent, model and analyze the threat of it. This paper is focused on the study of the building the model of the cyberspace from the view of the roles. Considering the construction of the cyberspace and the actors in the cyberspace being multi-networks and multi-roles, we construct the cyberspace bipartite network to describe the original pattern of connections of it. Then we perform two projections onto the actors and roles separately and construct the actor-network and the role-network based on the cyberspace bipartite network. To analyze the multi-level threats formally, the paper uses the case theory to establish the role-based multi-level threats model called RBT. The article also proposes the methodology using the RBT model to analyze the role-based multi-level threats in the cyberspace formally and effectively.
引用
收藏
页码:1302 / 1306
页数:5
相关论文
共 50 条
  • [21] Role-based approach to business process simulation modeling and analysis
    Cho, YH
    Kim, JK
    Kim, SH
    COMPUTERS & INDUSTRIAL ENGINEERING, 1998, 35 (1-2) : 343 - 346
  • [22] Role-based approaches for operational tasks modeling and flexible decomposition
    Zou, Zhigang
    Che, Wangfang
    Wang, Shusheng
    Bai, Yun
    Fan, Chengli
    JOURNAL OF SYSTEMS ENGINEERING AND ELECTRONICS, 2016, 27 (06) : 1191 - 1206
  • [23] A Verifiable Modeling Approach to Configurable Role-Based Access Control
    Kim, Dae-Kyoo
    Lu, Lunjin
    Kim, Sangsig
    FUNDAMENTAL APPROACHES TO SOFTWARE ENGINEERING, PROCEEDINGS, 2010, 6013 : 188 - 202
  • [24] A Role-Based Capability Modeling Approach for Adaptive Information Systems
    Schoen, Hendrik
    Zdravkovic, Jelena
    Stirna, Janis
    Strahringer, Susanne
    PRACTICE OF ENTERPRISE MODELING, POEM 2019, 2019, 369 : 68 - 82
  • [25] Role-based viewing envelopes for information protection in collaborative modeling
    Cera, CD
    Kim, T
    Han, JH
    Regli, WC
    COMPUTER-AIDED DESIGN, 2004, 36 (09) : 873 - 886
  • [26] Unifying and Generalizing Relations in Role-Based Data Modeling and Navigation
    Harkes, Daco
    Visser, Eelco
    SOFTWARE LANGUAGE ENGINEERING, SLE 2014, 2014, 8706 : 241 - 260
  • [27] A comprehensive modeling framework for role-based access control policies
    Ben Fadhel, Ameni
    Bianculli, Domenico
    Briand, Lionel
    JOURNAL OF SYSTEMS AND SOFTWARE, 2015, 107 : 110 - 126
  • [28] Role-based approach to business process simulation modeling and analysis
    Cho, Yoon Ho
    Kim, Jae Kyeong
    Kim, Soung Hie
    Computers and Industrial Engineering, 1998, 35 (1-2): : 343 - 346
  • [29] A feature-based approach for modeling role-based access control systems
    Kim, Sangsig
    Kim, Dae-Kyoo
    Lu, Lunjin
    Kim, Suntae
    Park, Sooyong
    JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (12) : 2035 - 2052
  • [30] Sharing protected web resources using distributed role-based modeling
    Encheva, S
    Tumin, S
    FRONTIERS OF WWW RESEARCH AND DEVELOPMENT - APWEB 2006, PROCEEDINGS, 2006, 3841 : 532 - 543