STUDY ON THE MODELING AND ANALYZING OF THE ROLE-BASED THREATS IN THE CYBERSPACE

被引:0
|
作者
Hao, Yeli [1 ]
Guo, Shize [1 ]
Zhao, Hong [1 ]
Chen, Zhe [1 ]
机构
[1] Grad Univ Chinese Acad Sci, Sch Management, Beijing 100049, Peoples R China
基金
中国国家自然科学基金;
关键词
Cybersapce; Bipartite network; One-mode projection; Role-based; Multi-level;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The modeling of the cyberspace and the analyzing of the threats in the cyberspace are both the innovational aspects in the area of defense space. The multi-networks, multi-subsystems, multi-roles and multi-level-threats of the cyberspace cause the nonlinearity and the indefiniteness of it which makes it difficult for us to represent, model and analyze the threat of it. This paper is focused on the study of the building the model of the cyberspace from the view of the roles. Considering the construction of the cyberspace and the actors in the cyberspace being multi-networks and multi-roles, we construct the cyberspace bipartite network to describe the original pattern of connections of it. Then we perform two projections onto the actors and roles separately and construct the actor-network and the role-network based on the cyberspace bipartite network. To analyze the multi-level threats formally, the paper uses the case theory to establish the role-based multi-level threats model called RBT. The article also proposes the methodology using the RBT model to analyze the role-based multi-level threats in the cyberspace formally and effectively.
引用
收藏
页码:1302 / 1306
页数:5
相关论文
共 50 条
  • [41] Role-based access control
    Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 2000, 21 (02): : 198 - 200
  • [42] Role-based infrastructures for agents
    Cabri, G
    EIGHTH IEEE WORKSHOP ON FUTURE TRENDS OF DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2001, : 210 - 214
  • [43] Role-Based Systems are Autonomic
    Zhu, Haibin
    PROCEEDINGS OF THE SEVENTH IEEE INTERNATIONAL CONFERENCE ON COGNITIVE INFORMATICS, 2008, : 144 - 152
  • [44] Delegation in a role-based organization
    Pacheco, O
    Santos, F
    DEONTIC LOGIC IN COMPUTER SCIENCE, PROCEEDINGS, 2004, 3065 : 209 - 227
  • [45] Role-based measurement of performance
    Murdoch, J
    Fernandes, KJ
    Astley, K
    INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOL 1-4, PROCEEDINGS, 2005, : 1586 - 1591
  • [46] ROLE-BASED NETWORK SECURITY
    JOLITZ, WF
    JOLITZ, LG
    DR DOBBS JOURNAL, 1995, 20 (05): : 80 - &
  • [47] Constrained role-based delegation
    Zhang, LH
    Ahn, GJ
    SECURITY AND PRIVACY IN THE AGE OF UNCERTAINTY, 2003, 122 : 289 - 300
  • [48] Role-based security policy
    Ma, Jianping
    Yu, Xiangxuan
    Hong, Fan
    Zhang, Jiangling
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 35 (05): : 447 - 450
  • [49] Modeling of the role-based access control policy with constraints using description logic
    Chae, Junghwa
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2007, PT 1, PROCEEDINGS, 2007, 4705 : 500 - 511
  • [50] Modeling and inferring on role-based access control policies using data dependencies
    Thion, Romuald
    Coulondre, Stephane
    DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2006, 4080 : 914 - 923