Access Control Capability Assessment Method Based on Security Entropy

被引:0
|
作者
Che, Tianwei [1 ]
Ma, Jianfeng [1 ]
Li, Na [2 ]
Wang, Chao [3 ]
机构
[1] Xidian Univ, Sch Comp Sci & Technol, Xian, Shaanxi, Peoples R China
[2] Northwestern Polytech Univ, Sch Comp Sci & Technol, Xian, Shaanxi, Peoples R China
[3] Informat Engn Univ, Zhengzhou, Henan, Peoples R China
基金
中国国家自然科学基金;
关键词
Information entropy; Security entropy; Classificatory access control model; Direct unauthorized access; Right about access; Indirectly unauthorized access;
D O I
10.4304/jcp.9.12.2804-2808
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In this paper, we propose analysis methods based on security entropy to overcome the problem of quantitative analysis, after going through the study of access control capability assessment for computer information system. At First, we computed the uncertainty how system determine irregular access behavior using the security entropy theory. Next, we defined the security theorem of classificatory information system, and proposed the standard of access control capability. Finally, we analyzed the typical access control models using the methods, and compared security and applicability of them. It proved that the method is appropriate for security quantitative analysis of access control model and for the evaluation of access control capability in information system.
引用
收藏
页码:2804 / 2808
页数:5
相关论文
共 50 条
  • [1] A security quantitative analysis method for access control based on security entropy
    Che, Tian-Wei
    Ma, Jian-Feng
    Li, Na
    Wang, Chao
    International Journal of Network Security, 2015, 17 (05): : 517 - 521
  • [2] Security analysis of access control model in hybrid cloud based on security entropy
    车天伟
    Ma Jianfeng
    Li Na
    Wang Chao
    HighTechnologyLetters, 2015, 21 (02) : 200 - 204
  • [3] A Method of Oil Security Kernel Indicator Assessment Based On Entropy
    Luo Chuanlong
    Zhang Xiaomei
    Hu Tianbao
    Chang Junqian
    PROCEEDINGS OF THE 2010 CHINESE SEMINAR ON THE PRINCIPLES OF SAFETY SCIENCE AND TECHNOLOGY, 2010, : 398 - 402
  • [4] A capability-based security approach to manage access control in the Internet of Things
    Gusmeroli, Sergio
    Piccione, Salvatore
    Rotondi, Domenico
    MATHEMATICAL AND COMPUTER MODELLING, 2013, 58 (5-6) : 1189 - 1205
  • [5] Assessment of Network Security Policy Based on Security Capability
    Tang, Chenghua
    Yu, Shunzheng
    2008 11TH IEEE SINGAPORE INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS (ICCS), VOLS 1-3, 2008, : 1204 - 1208
  • [6] POSTER:Quantitative Security Assessment Method based on Entropy for Moving Target
    Ma, Duohe
    Wang, Liming
    Lei, Cheng
    Xu, Zhen
    Zhang, Hongqi
    Li, Meng
    PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17), 2017, : 920 - 922
  • [7] Medical Information Access Control Method Based on Weighted Information Entropy
    Zheng, Lijuan
    Zhang, Linhao
    Cui, Meng
    Chen, Jianyou
    Yang, Shaobo
    Li, Zhaoxuan
    CLOUD COMPUTING AND SECURITY, PT III, 2018, 11065 : 113 - 122
  • [8] Gray Assessment of Equipment Maintenance Support Capability Based on the Structure Entropy Weight Method
    Huang, Tao
    Xiang, Jiaqi
    Yu, Hongmin
    THE 5TH INTERNATIONAL CONFERENCE ON MECHATRONICS AND MECHANICAL ENGINEERING (ICMME 2018), 2019, 256
  • [9] Enhancing Microservices Security with Token-Based Access Control Method
    Venckauskas, Algimantas
    Kukta, Donatas
    Grigaliunas, Sarunas
    Bruzgiene, Rasa
    SENSORS, 2023, 23 (06)
  • [10] Ship Security Assessment Based on Information Entropy
    Sheng Jin-lu
    Zhao Xiao-ling
    Xin Jun-feng
    Zhao Ya-bing
    2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 6285 - +