Access Control Capability Assessment Method Based on Security Entropy

被引:0
|
作者
Che, Tianwei [1 ]
Ma, Jianfeng [1 ]
Li, Na [2 ]
Wang, Chao [3 ]
机构
[1] Xidian Univ, Sch Comp Sci & Technol, Xian, Shaanxi, Peoples R China
[2] Northwestern Polytech Univ, Sch Comp Sci & Technol, Xian, Shaanxi, Peoples R China
[3] Informat Engn Univ, Zhengzhou, Henan, Peoples R China
基金
中国国家自然科学基金;
关键词
Information entropy; Security entropy; Classificatory access control model; Direct unauthorized access; Right about access; Indirectly unauthorized access;
D O I
10.4304/jcp.9.12.2804-2808
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In this paper, we propose analysis methods based on security entropy to overcome the problem of quantitative analysis, after going through the study of access control capability assessment for computer information system. At First, we computed the uncertainty how system determine irregular access behavior using the security entropy theory. Next, we defined the security theorem of classificatory information system, and proposed the standard of access control capability. Finally, we analyzed the typical access control models using the methods, and compared security and applicability of them. It proved that the method is appropriate for security quantitative analysis of access control model and for the evaluation of access control capability in information system.
引用
收藏
页码:2804 / 2808
页数:5
相关论文
共 50 条
  • [41] Access Control to Security Areas Based on Facial Classification
    Moreno Fdz de Leceta, Aitor
    Rincon, Mariano
    BIOINSPIRED APPLICATIONS IN ARTIFICIAL AND NATURAL COMPUTATION, PT II, 2009, 5602 : 254 - +
  • [42] Attribute Based Access Control and Security for Collaboration Environments
    Zhu, Jian
    Smari, Waleed W.
    NAECON 2008 - IEEE NATIONAL AEROSPACE AND ELECTRONICS CONFERENCE, 2008, : 31 - 35
  • [43] Mandatory Access Control Method for Windows Embedded OS Security
    Cho, Chaeho
    Seong, Yeonsang
    Won, Yoojae
    ELECTRONICS, 2021, 10 (20)
  • [44] ASP-based information access security control
    Li, Shengyi
    Cai, Shuqin
    Dong, Qingjun
    Zhang, Jinlong
    Jisuanji Gongcheng/Computer Engineering, 2000, 26 (12): : 26 - 27
  • [45] Security analysis in role-based access control
    Purdue University, West Lafayette, IN, United States
    不详
    不详
    不详
    ACM Trans. Inf. Syst. Secur., 2006, 4 (391-420):
  • [46] Security analysis for temporal role based access control
    Uzun, Emre
    Atluri, Vijayalakshmi
    Vaidya, Jaideep
    Sural, Shamik
    Ferrara, Anna
    Parlato, Gennaro
    Madhusudan, P.
    JOURNAL OF COMPUTER SECURITY, 2014, 22 (06) : 961 - 996
  • [47] Based on Entropy Method Regional Innovation Capability Evaluation in Gansu Province
    He, Lili
    Liu, Yanhua
    PROCEEDINGS OF THE NINTH INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE AND ENGINEERING MANAGEMENT, 2015, 362 : 893 - 901
  • [48] Study on Emergency Capability of City Public Safety Based on Entropy Method
    Li, Fei
    Wan, Xiangyun
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON MANAGEMENT, EDUCATION, INFORMATION AND CONTROL, 2015, 125 : 1724 - 1728
  • [49] IoT Security Access Authentication Method Based on Blockchain
    Cheng, Yang
    Lei, Min
    Chen, Shiyou
    Fang, Zigang
    Yang, Shuaipeng
    ADVANCED HYBRID INFORMATION PROCESSING, ADHIP 2019, PT II, 2019, 302 : 229 - 238
  • [50] Security access control method of heterogeneous database based on K-shortest path algorithm
    Zhou W.
    Yao M.
    International Journal of Reasoning-based Intelligent Systems, 2024, 16 (02) : 170 - 177