期刊文献+

基于家族基因的网络访问控制模型

Family-gene Based Network Access Control Model
在线阅读 下载PDF
导出
摘要 传统的网络访问控制机制大多与身份认证机制分开设计,针对其安全性差、效率低等问题,受人体免疫系统能自动识别并排斥非自体物质原理启发,该文提出了一种基于家族基因的网络访问控制模型(FBAC),给出了模型中网络家族、家族基因、基因证书等定义,建立了基因指派、制定族规、基因签名等用于生成基因证书的机制,描述了网络家族构造和基于家族基因的访问控制等算法。解决了入侵者绕过身份认证机制而存取网络资源的安全问题,克服了X.509数字证书认证效率低、证书主体信息不明确的缺陷,具有安全、高效等特点,是保障网络安全的一种有效新途径。 Inspired by principles of the human immune system, a family-gene based model for network access control, referred to as FBAC, is proposed. With the concepts and formal definitions of network-family, family-gene, and gene-certificate of FBAC presented, the bionic mechanisms of gene-assignment, family-rule constitution, and gene-signature for gene-certificate generation are established. The algorithms of network- family construction and family-gene based access control are described. The access control problems, which result from the penetration of conventional authentication mechanisms, are solved, and the defect of ambiguity of subject information in X.509 certificates is overcome. FBAC has a better safety and efficiency than the traditional techniques. It provides an effective novel solution to network security.
出处 《计算机工程》 CAS CSCD 北大核心 2007年第12期37-39,42,共4页 Computer Engineering
基金 国家自然科学基金资助项目(60373110 60573130 60502011) 教育部博士点基金资助项目(20030610003) 教育部新世纪优秀人才计划基金资助项目(NCET-04-0870) 郑州市科技攻关基金资助项目(064STRF40278)
关键词 网络安全 访问控制 免疫 家族基因 Network security Access control Immunity Family-gene
  • 相关文献

参考文献2

二级参考文献23

  • 1Butler D.. Computer security: Who's been looking at your data? Nature, 2002, 418:580-582
  • 2Albert R. , Jeong H. , Barabasi A. L.. Diameter of the worldwide Web. Nature, 1999, 401:130-131
  • 3Balthrop J. , Forrest S. , Newman M. E. J. , Williamson M.M.. Technological networks and the spread of computer viruses. Science, 2004, 304(5670): 527-529
  • 4Staniford S. , Paxson V. , Weaver N.. How to own the internet in your spare time. In: Proceedings of the 11th USENIX Security Symposium, San Francisco Marriott, 2002, 149-167
  • 5Morda D.. Public monitoring. In: Proceedings of the 16th FIRST Conference on Computer Security Incident Handling Response, Budapest, 2004, 81-88
  • 6Albert R. , Jeong H. , Barabasi A.L.. Attack and error tolerance of complex networks. Nature, 2002, 406:378-382
  • 7Klarreich E.. Inspired by Immunity, Nature, 2002, 415:468-470
  • 8Forrest S. , Perelson A. S.. Self-nonself discrimination in a computer. In; Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, 1994, 202-213
  • 9Hofmeyr S. , Forrest S.. Architecture for an artificial immune system. Evolutionary Computation, 2000, 8(4): 443-473
  • 10Harmer P. K. , Williams P. D. , Gunsch G. H. , Lamont G. B.An artificial immune system architecture for computer security applications. IEEE Transactions on Evolutionary Computation,2002, 6(3): 252-280

共引文献80

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部