For the issue of the discretionary access control(DAC) model safety analysis,a logic method is proposed.This method takes the GD model as the classic DAC model and Prolog as the basic language to describe system sta...For the issue of the discretionary access control(DAC) model safety analysis,a logic method is proposed.This method takes the GD model as the classic DAC model and Prolog as the basic language to describe system states and state transfer rules.A general program based on this logic method is proposed for DAC safety analysis,but this program may never be terminal for some safety analysis goal.The safety analysis algorithm is achieved by simplifying the general program according to the property of the DAC model state transfer rules.This safety analysis algorithm is easier to understand and implement than the previous algorithms and its time complexity is O(N+M+T),in which N,M,and T are the numbers of the rights with copy flag,the policies for right transferring,and the policies for right permitting,respectively.展开更多
With the rapid development of blockchain technology,the Chinese government has proposed that the commercial use of blockchain services in China should support the national encryption standard,also known as the state s...With the rapid development of blockchain technology,the Chinese government has proposed that the commercial use of blockchain services in China should support the national encryption standard,also known as the state secret algorithm GuoMi algorithm.The original Hyperledger Fabric only supports internationally common encryption algorithms,so it is particularly necessary to enhance support for the national encryption standard.Traditional identity authentication,access control,and security audit technologies have single-point failures,and data can be easily tampered with,leading to trust issues.To address these problems,this paper proposes an optimized and application research plan for Hyperledger Fabric.We study the optimization model of cryptographic components in Hyperledger Fabric,and based on Fabric's pluggable mechanism,we enhance the Fabric architecture with the national encryption standard.In addition,we research key technologies involved in the secure application protocol based on the blockchain.We propose a blockchain-based identity authentication protocol,detailing the design of an identity authentication scheme based on blockchain certificates and Fabric CA,and use a dual-signature method to further improve its security and reliability.Then,we propose a flexible,dynamically configurable real-time access control and security audit mechanism based on blockchain,further enhancing the security of the system.展开更多
This paper presents intelligent access control for a charging station and a framework for dynamically and adaptively managing charging requests from randomly arriving electric vehicles(EVs),to increase the revenue of ...This paper presents intelligent access control for a charging station and a framework for dynamically and adaptively managing charging requests from randomly arriving electric vehicles(EVs),to increase the revenue of the station.First,charging service requests from random EV arrivals are described as an event-driven sequential decision process,and the decision-making relies on an eventextended state that is composed of the real-time electricity price,real-time charging station state,and EV arrival event.Second,a state aggregation method is introduced to reduce the state space by first aggregating the charging station state in the form of the remaining charging time and then further aggregating it via sort coding.Besides,mathematical calculations of the code value are provided,and their uniqueness and continuous integer characteristics are proved.Then,a corresponding Q-learning method is proposed to derive an optimal or suboptimal access control policy.The results of a case study demonstrate that the proposed learning optimisation method based on the event-extended state aggregation performs better than flat Q-learning.The space complexity and time complexity are significantly reduced,which substantially improves the learning efficiency and optimisation performance.展开更多
基金Supported by the National High Technology Research and Development Program of China (863 Program) (2007AA01Z471)
文摘For the issue of the discretionary access control(DAC) model safety analysis,a logic method is proposed.This method takes the GD model as the classic DAC model and Prolog as the basic language to describe system states and state transfer rules.A general program based on this logic method is proposed for DAC safety analysis,but this program may never be terminal for some safety analysis goal.The safety analysis algorithm is achieved by simplifying the general program according to the property of the DAC model state transfer rules.This safety analysis algorithm is easier to understand and implement than the previous algorithms and its time complexity is O(N+M+T),in which N,M,and T are the numbers of the rights with copy flag,the policies for right transferring,and the policies for right permitting,respectively.
基金supported by Fujian Provincial Social Science Foundation Public Security Theory Research Project(FJ2023TWGA004)Education and Scientific Research Special Project of Fujian Provincial Department of Finance(Research on the Application of Blockchain Technology in Prison Law Enforcement Management),under National Key R&D Program of China(2020YFB1005500)。
文摘With the rapid development of blockchain technology,the Chinese government has proposed that the commercial use of blockchain services in China should support the national encryption standard,also known as the state secret algorithm GuoMi algorithm.The original Hyperledger Fabric only supports internationally common encryption algorithms,so it is particularly necessary to enhance support for the national encryption standard.Traditional identity authentication,access control,and security audit technologies have single-point failures,and data can be easily tampered with,leading to trust issues.To address these problems,this paper proposes an optimized and application research plan for Hyperledger Fabric.We study the optimization model of cryptographic components in Hyperledger Fabric,and based on Fabric's pluggable mechanism,we enhance the Fabric architecture with the national encryption standard.In addition,we research key technologies involved in the secure application protocol based on the blockchain.We propose a blockchain-based identity authentication protocol,detailing the design of an identity authentication scheme based on blockchain certificates and Fabric CA,and use a dual-signature method to further improve its security and reliability.Then,we propose a flexible,dynamically configurable real-time access control and security audit mechanism based on blockchain,further enhancing the security of the system.
基金the National Natural Science Foundation of China under Grant Nos.61871412,61972439。
文摘This paper presents intelligent access control for a charging station and a framework for dynamically and adaptively managing charging requests from randomly arriving electric vehicles(EVs),to increase the revenue of the station.First,charging service requests from random EV arrivals are described as an event-driven sequential decision process,and the decision-making relies on an eventextended state that is composed of the real-time electricity price,real-time charging station state,and EV arrival event.Second,a state aggregation method is introduced to reduce the state space by first aggregating the charging station state in the form of the remaining charging time and then further aggregating it via sort coding.Besides,mathematical calculations of the code value are provided,and their uniqueness and continuous integer characteristics are proved.Then,a corresponding Q-learning method is proposed to derive an optimal or suboptimal access control policy.The results of a case study demonstrate that the proposed learning optimisation method based on the event-extended state aggregation performs better than flat Q-learning.The space complexity and time complexity are significantly reduced,which substantially improves the learning efficiency and optimisation performance.