Access Control Capability Assessment Method Based on Security Entropy

被引:0
|
作者
Che, Tianwei [1 ]
Ma, Jianfeng [1 ]
Li, Na [2 ]
Wang, Chao [3 ]
机构
[1] Xidian Univ, Sch Comp Sci & Technol, Xian, Shaanxi, Peoples R China
[2] Northwestern Polytech Univ, Sch Comp Sci & Technol, Xian, Shaanxi, Peoples R China
[3] Informat Engn Univ, Zhengzhou, Henan, Peoples R China
基金
中国国家自然科学基金;
关键词
Information entropy; Security entropy; Classificatory access control model; Direct unauthorized access; Right about access; Indirectly unauthorized access;
D O I
10.4304/jcp.9.12.2804-2808
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In this paper, we propose analysis methods based on security entropy to overcome the problem of quantitative analysis, after going through the study of access control capability assessment for computer information system. At First, we computed the uncertainty how system determine irregular access behavior using the security entropy theory. Next, we defined the security theorem of classificatory information system, and proposed the standard of access control capability. Finally, we analyzed the typical access control models using the methods, and compared security and applicability of them. It proved that the method is appropriate for security quantitative analysis of access control model and for the evaluation of access control capability in information system.
引用
收藏
页码:2804 / 2808
页数:5
相关论文
共 50 条
  • [31] Capability-based IoT access control using blockchain
    Liu, Yue
    Lu, Qinghua
    Chen, Shiping
    Qu, Qiang
    O'Connor, Hugo
    Choo, Kim-Kwang Raymond
    Zhang, He
    DIGITAL COMMUNICATIONS AND NETWORKS, 2021, 7 (04) : 463 - 469
  • [32] Capability Based Network Access Control for Smart Home Devices
    Matsumoto, Naoki
    Kotani, Daisuke
    Okabe, Yasuo
    2022 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS AND OTHER AFFILIATED EVENTS (PERCOM WORKSHOPS), 2022,
  • [33] A Capability-Based Access Control Framework with Delegation Support
    Shen, Haibo
    WIRELESS COMMUNICATIONS, NETWORKING AND APPLICATIONS, WCNA 2014, 2016, 348 : 655 - 667
  • [34] Capability-based IoT access control using blockchain
    Yue Liu
    Qinghua Lu
    Shiping Chen
    Qiang Qu
    Hugo OConnor
    KimKwang Raymond Choo
    He Zhang
    Digital Communications and Networks, 2021, 7 (04) : 463 - 469
  • [35] Group-Capability-Based Access Control with Ring Signature
    Zhu, Xiaoying
    Zou, Shihong
    Xu, Guoai
    Xi, Jinwen
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2025, 90
  • [36] Capability-based access control model for distributed systems
    Zheng, Qingji
    Chen, Kefei
    ADVANCING SCIENCE THROUGH COMPUTATION, 2008, : 104 - 109
  • [37] Fine grained control of security capability and forward security in a pairing based signature scheme
    Ju, HS
    Kim, DY
    Lee, DH
    Lim, J
    Chun, K
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2005, PT 2, 2005, 3481 : 381 - 390
  • [38] Research on security access control method of power intranet terminal
    Chen, L.
    Liu, X.
    Deng, S.
    Manufacturing and Engineering Technology, 2015, : 409 - 412
  • [39] Attribute Based Access Control for APIs in Spring Security
    Armando, Alessandro
    Carbone, Roberto
    Chekole, Eyasu Getahun
    Ranise, Silvio
    PROCEEDINGS OF THE 19TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'14), 2014, : 85 - 88
  • [40] The Research on Security Access Control Method of Power Intranet Terminal
    Shao Zhipeng
    Chen Huazhi
    Li Weiwei
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS RESEARCH AND MECHATRONICS ENGINEERING, 2015, 121 : 764 - 768