期刊文献+
共找到686篇文章
< 1 2 35 >
每页显示 20 50 100
Security analysis of access control model in hybrid cloud based on security entropy 被引量:2
1
作者 车天伟 Ma Jianfeng +1 位作者 Li Na Wang Chao 《High Technology Letters》 EI CAS 2015年第2期200-204,共5页
To resolve the problem of quantitative analysis in hybrid cloud,a quantitative analysis method,which is based on the security entropy,is proposed.Firstly,according to the information theory,the security entropy is put... To resolve the problem of quantitative analysis in hybrid cloud,a quantitative analysis method,which is based on the security entropy,is proposed.Firstly,according to the information theory,the security entropy is put forward to calculate the uncertainty of the system' s determinations on the irregular access behaviors.Secondly,based on the security entropy,security theorems of hybrid cloud are defined.Finally,typical access control models are analyzed by the method,the method's practicability is validated,and security and applicability of these models are compared.Simulation results prove that the proposed method is suitable for the security quantitative analysis of the access control model and evaluation to access control capability in hybrid cloud. 展开更多
关键词 hybrid cloud security entropy classificatory access control model directly unauthorized access right about access indirectly unauthorized access
在线阅读 下载PDF
The Research of Role Tree-Based Access Control Model
2
作者 陆虹 夏天 《Journal of Donghua University(English Edition)》 EI CAS 2010年第2期274-276,共3页
Towards the crossing and coupling permissions in tasks existed widely in many fields and considering the design of role view must rely on the activities of the tasks process,based on Role Based Accessing Control (RBAC... Towards the crossing and coupling permissions in tasks existed widely in many fields and considering the design of role view must rely on the activities of the tasks process,based on Role Based Accessing Control (RBAC) model,this paper put forward a Role Tree-Based Access Control (RTBAC) model. In addition,the model definition and its constraint formal description is also discussed in this paper. RTBAC model is able to realize the dynamic organizing,self-determination and convenience of the design of role view,and guarantee the least role permission when task separating in the mean time. 展开更多
关键词 Role Based accessing control (RBAC) Role Tree-Based access control (RTBAC) models Constraints Permission
在线阅读 下载PDF
Tenant-based access control model for multi-tenancy and sub-tenancy architecture in Software-as-a-Service 被引量:3
3
作者 Qiong zuo Meiyi XIE +1 位作者 Guanqiu QI Hong ZHU 《Frontiers of Computer Science》 SCIE EI CSCD 2017年第3期465-484,共20页
Software-as-a-Service (SaaS) introduces multi- tenancy architecture (MTA). Sub-tenancy architecture (STA), is an extension of MTA, allows tenants to offer services for subtenant developers to customize their app... Software-as-a-Service (SaaS) introduces multi- tenancy architecture (MTA). Sub-tenancy architecture (STA), is an extension of MTA, allows tenants to offer services for subtenant developers to customize their applications in the SaaS infrastructure. In a STA system, tenants can create sub- tenants, and grant their resources (including private services and data) to their subtenants. The isolation and sharing re- lations between parent-child tenants, sibling tenants or two non-related tenants are more complicated than those between tenants in MTA. It is important to keep service components or data private, and at the same time, allow them to be shared, and support application customizations for tenants. To ad- dress this problem, this paper provides a formal definition of a new tenant-based access control model based on administra- tive role-based access control (ARBAC) for MTA and STA in service-oriented SaaS (called TMS-ARBAC). Autonomous areas (AA) and AA-tree are proposed to describe the auton- omy of tenants, including their isolation and sharing relation- ships. Authorization operations on AA and different resource sharing strategies are defined to create and deploy the access control scheme in STA models. TMS-ARBAC model is ap- plied to design a geographic e-Science platform. 展开更多
关键词 Software-as-a-Service (SaaS) multi-tenancy architecture (MTA) sub-tenancy architecture (STA) rolebased access control (RBAC) model tenant-based access control model
原文传递
Specification and Verification of a Topology-Aware Access Control Model for Cyber-Physical Space 被引量:4
4
作者 Yan Cao Zhiqiu Huang +2 位作者 Shuanglong Kan Dajuan Fan Yang Yang 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2019年第5期497-519,共23页
The cyber-physical space is a spatial environment that integrates the cyber and physical worlds to provide an intelligent environment for users to conduct their day-to-day activities. Mobile users and mobile objects a... The cyber-physical space is a spatial environment that integrates the cyber and physical worlds to provide an intelligent environment for users to conduct their day-to-day activities. Mobile users and mobile objects are ubiquitous in this space, thereby exerting tremendous pressure on its security model. This model must ensure that both cyber and physical objects are always handled securely in this dynamic environment. In this paper,we propose a systematic solution to be able to specify security policies of the cyber-physical space and ensure that security requirements hold in these policies. We first formulate a topology configuration model to capture the topology characteristics of the cyber and physical worlds. Then, based on this model, a Topology-Aware CyberPhysical Access Control model(TA-CPAC) is proposed, which can ensure the security of the cyber and physical worlds at the same time by adjusting permission assignment dynamically. Then, the topology configuration and TA-CPAC models are formalized by bigraphs and Bigraph Reactive System(BRS), respectively, allowing us to use model checking to rationalize the consequences of the evolution of topological configurations on the satisfaction of security requirements. Finally, a case study on a building automation access control system is conducted to evaluate the effectiveness of the proposed approach. 展开更多
关键词 cyber-physical space TOPOLOGY CONFIGURATION access control model CHECKING bigraphs
原文传递
A Multi-Tenant Usage Access Model for Cloud Computing 被引量:1
5
作者 Zhengtao Liu Yun Yang +1 位作者 Wen Gu Jinyue Xia 《Computers, Materials & Continua》 SCIE EI 2020年第8期1233-1245,共13页
Most cloud services are built with multi-tenancy which enables data and configuration segregation upon shared infrastructures.It offers tremendous advantages for enterprises and service providers.It is anticipated tha... Most cloud services are built with multi-tenancy which enables data and configuration segregation upon shared infrastructures.It offers tremendous advantages for enterprises and service providers.It is anticipated that this situation will evolve to foster cross-tenant collaboration supported by Authorization as a service.To realize access control in a multi-tenant cloud computing environment,this study proposes a multi-tenant cloud computing access control model based on the traditional usage access control model by building trust relations among tenants.The model consists of three sub-models,which achieve trust relationships between tenants with different granularities and satisfy the requirements of different application scenarios.With an established trust relation in MT-UCON(Multi-tenant Usage Access Control),the trustee can precisely authorize cross-tenant accesses to the trustor’s resources consistent with constraints over the trust relation and other components designated by the trustor.In addition,the security of the model is analyzed by an information flow method.The model adapts to the characteristics of a dynamic and open multi-tenant cloud computing environment and achieves fine-grained access control within and between tenants. 展开更多
关键词 Multi-tenant usage access control model cloud computing
在线阅读 下载PDF
Virus spreading in wireless sensor networks with a medium access control mechanism 被引量:4
6
作者 王亚奇 杨晓元 《Chinese Physics B》 SCIE EI CAS CSCD 2013年第4期70-74,共5页
In this paper, an extended version of standard susceptible-infected (SI) model is proposed to consider the influence of a medium access control mechanism on virus spreading in wireless sensor networks. Theoretical a... In this paper, an extended version of standard susceptible-infected (SI) model is proposed to consider the influence of a medium access control mechanism on virus spreading in wireless sensor networks. Theoretical analysis shows that the medium access control mechanism obviously reduces the density of infected nodes in the networks, which has been ignored in previous studies. It is also found that by increasing the network node density or node communication radius greatly increases the number of infected nodes. The theoretical results are confirmed by numerical simulations. 展开更多
关键词 wireless sensor networks medium access control virus spreading susceptible-infected model
原文传递
Remote Attestation-Based Access Control on Trusted Computing Platform
7
作者 LIU Xian'gang ZHANG Xing FU Yingfang SHEN Changxiang 《Wuhan University Journal of Natural Sciences》 CAS 2010年第3期190-194,共5页
Existing remote attestation schemes based on trusted computing have some merits on enhancing security assurance level, but they usually do not integrate tightly with the classical system security mechanism. In this pa... Existing remote attestation schemes based on trusted computing have some merits on enhancing security assurance level, but they usually do not integrate tightly with the classical system security mechanism. In this paper, we present a component named remote attestation-based access controller (RABAC), which is based on a combination of techniques, such as random number, Bell-La Padula (BLP) model, user identity combined with his security properties and so on. The component can validate the current hardware and software integrity of the remote platform, and implement access control with different security policy. We prove that the RABAC can not only improve the security of transferred information in remote attestation process but also integrate remote attestation and classical system security mechanism effectively. 展开更多
关键词 trusted computing remote attestation access control security model
原文传递
Experience-Based Access Control in UbiComp: A New Paradigm
8
作者 Nalini A. Mhetre Arvind V. Deshpande Parikshit N. Mahalle 《Journal of Computer and Communications》 2022年第1期133-157,共25页
Experience is a sociological concept and builds over time. In a broader sense, the human-centered equivalents of experience and trust apply to D2D interaction. Ubiquitous computing (UbiComp) embeds intelligence and co... Experience is a sociological concept and builds over time. In a broader sense, the human-centered equivalents of experience and trust apply to D2D interaction. Ubiquitous computing (UbiComp) embeds intelligence and computing capabilities in everyday objects to make them effectively communicate, share resources, and perform useful tasks. The safety of resources is a serious problem. As a result, authorization and access control in UbiComp is a significant challenge. Our work presents experience as an outcome of history (HI), reliability (RL), transitivity (TR), and Ubiquity (UB). This experience model is easily adaptable to a variety of self-regulating context-aware access control systems. This paper proposes a framework for Experience-Based Access Control (EX-BAC) with all major services provided by the model. EX-BAC extends attribute-based access control. It uses logical device type and experience as context parameters for policy design. When compared with the state-of-the-art, EX-BAC is efficient with respect to response time. 展开更多
关键词 access control Experience-Based access control Experience model History Reliability TRANSITIVITY Ubiquitous Computing Ubiquity
在线阅读 下载PDF
Mobility Conscious Medium Access Control Scheme for Wireless Sensor Networks: A Conceptual Approach
9
作者 Adeniran Ishola Oluwaranti Tayo Dorcas Obasanya 《Wireless Sensor Network》 2014年第7期129-135,共7页
Mobility in Wireless Sensor Network (WSN) presents distinctive challenges in Medium Access Control (MAC) scheme. Numerous MAC protocols for sensor networks assume that sensor nodes are static and focus primarily on en... Mobility in Wireless Sensor Network (WSN) presents distinctive challenges in Medium Access Control (MAC) scheme. Numerous MAC protocols for sensor networks assume that sensor nodes are static and focus primarily on energy efficiency. This work seeks to develop an improved mobility conscious medium access control scheme for wireless sensor networks with a view to enhance energy conservation on mobile sensor nodes. On this note, mobility patterns of different scenarios are modelled using Gauss Markov Mobility Model (GMMM) to determine the position and distance of the sensor nodes and how they are correlated in time. 展开更多
关键词 MOBILITY Medium access control Wireless Sensor Networks GAUSS MARKOV MOBILITY model
在线阅读 下载PDF
Study on Mandatory Access Control in a Secure Database Management System
10
作者 ZHU Hong, FENG Yu cai School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan 430074, China 《Journal of Shanghai University(English Edition)》 CAS 2001年第4期299-307,共9页
This paper proposes a security policy model for mandatory access control in class B1 database management system whose level of labeling is tuple. The relation hierarchical data model is extended to multilevel relatio... This paper proposes a security policy model for mandatory access control in class B1 database management system whose level of labeling is tuple. The relation hierarchical data model is extended to multilevel relation hierarchical data model. Based on the multilevel relation hierarchical data model, the concept of upper lower layer relational integrity is presented after we analyze and eliminate the covert channels caused by the database integrity. Two SQL statements are extended to process polyinstantiation in the multilevel secure environment. The system is based on the multilevel relation hierarchical data model and is capable of integratively storing and manipulating multilevel complicated objects ( e.g., multilevel spatial data) and multilevel conventional data ( e.g., integer, real number and character string). 展开更多
关键词 multilevel relation hierarchical data model covert channels mandatory access control POLYINSTANTIATION hierarchical classification non hierarchical category security level multilevel relation hierarchical instance integrity cluster
在线阅读 下载PDF
Analysis and Application for Integrity Model on Trusted Platform
11
作者 TU Guo-qing ZHANG Huan-guo +1 位作者 WANG Li-na YU Dan-dan 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期35-38,共4页
To build a trusted platform based on Trusted Computing Platform Alliance(TCPA)'s recommendation,we analyze the integrity mechanism for such a PC platfoim in this paper.By combinning access control model with infor... To build a trusted platform based on Trusted Computing Platform Alliance(TCPA)'s recommendation,we analyze the integrity mechanism for such a PC platfoim in this paper.By combinning access control model with information flow model,we put forwarda combinedprocess-based lattice model to enforce security This moelel creates a trust chain by which we canmanage a series of processes from a core root of trust module to some other application modules Inthe model,once the trust chain is created andmanaged cor-rectly,the integrity of the computer'shardware and sofware has bctn maintained,so does the confidentiality and authenticity.Moreover,arelevant implementation of the model is explained. 展开更多
关键词 tiusted computing access control model information flow model trust chain INTEGRITY
在线阅读 下载PDF
随机多址协议下的鲁棒模型预测控制策略
12
作者 黄朕荣 董钰莹 高晨曦 《华侨大学学报(自然科学版)》 2026年第1期119-126,共8页
为在通信资源受限的网络化控制系统中实现对多胞不确定对象的控制,提出一种考虑随机多址协议(RMP)的鲁棒模型预测控制(RMPC)策略。首先,构建一类受通信约束与参数不确定性的闭环系统模型;其次,利用参数依赖Lyapunov函数与线性矩阵不等式... 为在通信资源受限的网络化控制系统中实现对多胞不确定对象的控制,提出一种考虑随机多址协议(RMP)的鲁棒模型预测控制(RMPC)策略。首先,构建一类受通信约束与参数不确定性的闭环系统模型;其次,利用参数依赖Lyapunov函数与线性矩阵不等式,将RMPC优化问题转化为可在线求解的凸优化问题,进而推导保证闭环系统均方稳定的充分条件;最后,对所提策略进行仿真算例验证。结果表明:经过100次独立实验验证,所提策略在随机网络环境下仍能有效保证闭环系统的均方稳定性。 展开更多
关键词 鲁棒预测控制 随机多址协议 网络化控制系统 均方稳定性
在线阅读 下载PDF
Multilevel security model for ad hoc networks 被引量:1
13
作者 Wang Changda Ju Shiguang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第2期391-397,F0003,共8页
Modern battlefield doctrine is based on mobility, flexibility, and rapid response to changing situations. As is well known, mobile ad hoc network systems are among the best utilities for battlefield activity. Although... Modern battlefield doctrine is based on mobility, flexibility, and rapid response to changing situations. As is well known, mobile ad hoc network systems are among the best utilities for battlefield activity. Although much research has been done on secure routing, security issues have largely been ignored in applying mobile ad hoc network theory to computer technology. An ad hoc network is usually assumed to be homogeneous, which is an irrational assumption for armies. It is clear that soldiers, commanders, and commanders-in-chief should have different security levels and computation powers as they have access to asymmetric resources. Imitating basic military rank levels in battlefield situations, how multilevel security can be introduced into ad hoc networks is indicated, thereby controlling restricted classified information flows among nodes that have different security levels. 展开更多
关键词 ad hoc network multilevel security model access control.
在线阅读 下载PDF
A Lattice Model on P2P Based on Trust and Role
14
作者 Yihe Liu 《通讯和计算机(中英文版)》 2010年第1期46-50,共5页
关键词 P2P网络 格子模型 信任度 基于角色的访问控制 信息安全模型 RBAC 晶格模型 信息流
在线阅读 下载PDF
面向多元时序大数据的用户访问控制模型构建
15
作者 高鹏 朱晓丽 《陇东学院学报》 2025年第2期27-31,共5页
考虑到用户访问网络时产生的时序大数据存在差异,容易出现个人信息泄露风险,为了提高用户访问的安全性,提出面向多元时序大数据的用户访问控制模型构建研究。通过用户访问行为中多元时序大数据的分块处理,分析用户访问行为的时序组成,... 考虑到用户访问网络时产生的时序大数据存在差异,容易出现个人信息泄露风险,为了提高用户访问的安全性,提出面向多元时序大数据的用户访问控制模型构建研究。通过用户访问行为中多元时序大数据的分块处理,分析用户访问行为的时序组成,根据时序数据的分类情况,挖掘出用户访问行为的多元时序大数据。基于用户访问节点的合并过程,计算出用户在访问链路上的隐私度,根据用户在链路所有节点产生的隐私度,计算用户成功访问网络时的节点隐私度。利用模糊综合评价的方法,计算出用户信誉的隶属度向量,引入模糊化的方式对用户信誉的综合判定矩阵进行转换,得到用户整体信誉在不同级别下的隶属情况,当网络对用户产生一定信誉之后,构建用户访问控制模型,实现用户访问的控制。实验结果表明,该模型能够控制用户的访问行为,通过降低网络数据的泄露数量和提高授权效率,提高用户访问的安全性。 展开更多
关键词 时序大数据 用户访问 数据挖掘 隐私度 访问控制 控制模型
在线阅读 下载PDF
基于零信任的网络安全模型架构及其应用
16
作者 王长杰 《清远职业技术学院学报》 2025年第4期68-75,共8页
由于云计算、远程访问技术的广泛应用,网络边界变得日益模糊,加之网络攻击行为的复杂性和手段的多样性,传统基于边界防护的网络安全架构暴露出防护能力不足和局限性,无法满足当前网络安全防护要求。零信任网络安全模型采用以身份认证为... 由于云计算、远程访问技术的广泛应用,网络边界变得日益模糊,加之网络攻击行为的复杂性和手段的多样性,传统基于边界防护的网络安全架构暴露出防护能力不足和局限性,无法满足当前网络安全防护要求。零信任网络安全模型采用以身份认证为中心的安全保护模式,使访问行为更加安全可信。本文在对传统网络架构及安全隐患介绍的基础上,阐述零信任网络安全架构技术和核心思想,设计出包括控制层面、数据层面、访问主体、访问客体四部分的零信任网络安全应用模型总体架构,并提出在远程移动办公和云计算应用场景中的可行性解决方案,确保网络中各类资源能够可信可控地被访问。 展开更多
关键词 零信任 身份认证 动态访问控制 网络安全模型
在线阅读 下载PDF
A Multilevel Secure Relation-Hierarchical Data Model for a Secure DBMS
17
作者 朱虹 冯玉才 《Journal of Modern Transportation》 2001年第1期8-16,共9页
A multilevel secure relation hierarchical data model for multilevel secure database is extended from the relation hierarchical data model in single level environment in this paper. Based on the model, an upper lowe... A multilevel secure relation hierarchical data model for multilevel secure database is extended from the relation hierarchical data model in single level environment in this paper. Based on the model, an upper lower layer relationalintegrity is presented after we analyze and eliminate the covert channels caused by the database integrity.Two SQL statements are extended to process polyinstantiation in the multilevel secure environment.The system based on the multilevel secure relation hierarchical data model is capable of integratively storing and manipulating complicated objects ( e.g. , multilevel spatial data) and conventional data ( e.g. , integer, real number and character string) in multilevel secure database. 展开更多
关键词 DATABASES data structure data models secure DBMS covert channels mandatory access control POLYINSTANTIATION hierarchical classification non hierarchical category security level integrity cluster index
在线阅读 下载PDF
支持上下文感知的图结构混合访问控制模型
18
作者 陈函 袁凌云 +2 位作者 张黔会 戴晖 保昊辰 《计算机应用研究》 北大核心 2025年第5期1490-1499,共10页
针对现有访问控制模型在高负载情况下性能不足、缺乏对上下文信息的综合考虑等问题,提出一种支持上下文感知的图结构访问控制模型G-RABAC(graph-based role and attribute-based access control)。首先,G-RABAC结合RBAC(role-based acce... 针对现有访问控制模型在高负载情况下性能不足、缺乏对上下文信息的综合考虑等问题,提出一种支持上下文感知的图结构访问控制模型G-RABAC(graph-based role and attribute-based access control)。首先,G-RABAC结合RBAC(role-based access control)与ABAC(attribute-based access control)模型,将基于ABAC的访问控制策略可视化为授权图,定义角色间的关系为特殊的主体属性,实现了属性和上下文信息的高效管理。其次,构建了基于G-RABAC的访问控制框架,并设计了基于上下文的访问控制决策算法和风险感知算法,实现了支持多维上下文感知的访问控制。在此基础上,集成区块链和G-RABAC模型,设计了用户身份合法性验证合约,结合Web3.0技术有效监控和处理用户访问行为,提升了访问控制的安全性和透明性。实验结果表明,G-RABAC模型的访问控制效率显著提升,与所选基线方案相比,访问控制时间开销基本维持在230 ms以内,且能够在多用户并发场景中支持安全且细粒度的访问控制,具备更高的灵活性和扩展性。 展开更多
关键词 混合访问控制 图模型 上下文感知 区块链
在线阅读 下载PDF
“教育-准入-监管”三位一体实验室安全管理模式——以西北大学化学国家级实验教学示范中心为例
19
作者 周亚倩 赵春欣 +4 位作者 张丹 刘哲 张天龙 崔斌 李延 《大学化学》 2025年第11期346-353,共8页
西北大学化学国家级实验教学示范中心以“教育奠基、准入把关、监管护航”为核心理念,创新构建了“教育-准入-监管”三位一体的实验室安全管理体系,实现了实验室安全管理从被动应对到主动预防的转型升级。安全教育奠定了扎实的知识基础... 西北大学化学国家级实验教学示范中心以“教育奠基、准入把关、监管护航”为核心理念,创新构建了“教育-准入-监管”三位一体的实验室安全管理体系,实现了实验室安全管理从被动应对到主动预防的转型升级。安全教育奠定了扎实的知识基础,准入制度明确了严格的准入要求,实时监管则形成了全天候的安全防护网。这一模式不仅实现了安全管理效能的全面提升,更通过持续的教育浸润和智能化的制度约束,培育了师生的安全文化认同,为高校实验室安全管理提供了可复制、可推广的模式,有力支撑了教学科研工作的高质量发展。 展开更多
关键词 实验室安全 安全教育 准入制度 管理模式
在线阅读 下载PDF
基于零信任架构的医院内网访问控制模型设计研究 被引量:1
20
作者 韩瑞泽 伦怡葱 徐建昭 《信息与电脑》 2025年第17期83-85,共3页
当前,医院内网访问控制依赖传统的边界安全策略。该策略难以有效应对内部威胁、设备失陷及高级持续性攻击,致使敏感医疗数据面临较高的泄露风险。为解决这一问题,文章提出基于零信任架构(Zero Trust Architecture,ZTA)的医院内网访问控... 当前,医院内网访问控制依赖传统的边界安全策略。该策略难以有效应对内部威胁、设备失陷及高级持续性攻击,致使敏感医疗数据面临较高的泄露风险。为解决这一问题,文章提出基于零信任架构(Zero Trust Architecture,ZTA)的医院内网访问控制模型设计研究,构建以多因素身份验证、动态访问控制、持续信任评估为核心的安全体系,旨在通过该模型的实际应用,显著降低未授权访问风险,提升医院内网安全性,优化合规管理流程。 展开更多
关键词 零信任架构 医院内网 访问控制模型
在线阅读 下载PDF
上一页 1 2 35 下一页 到第
使用帮助 返回顶部