期刊文献+
共找到683篇文章
< 1 2 35 >
每页显示 20 50 100
Security analysis of access control model in hybrid cloud based on security entropy 被引量:2
1
作者 车天伟 Ma Jianfeng +1 位作者 Li Na Wang Chao 《High Technology Letters》 EI CAS 2015年第2期200-204,共5页
To resolve the problem of quantitative analysis in hybrid cloud,a quantitative analysis method,which is based on the security entropy,is proposed.Firstly,according to the information theory,the security entropy is put... To resolve the problem of quantitative analysis in hybrid cloud,a quantitative analysis method,which is based on the security entropy,is proposed.Firstly,according to the information theory,the security entropy is put forward to calculate the uncertainty of the system' s determinations on the irregular access behaviors.Secondly,based on the security entropy,security theorems of hybrid cloud are defined.Finally,typical access control models are analyzed by the method,the method's practicability is validated,and security and applicability of these models are compared.Simulation results prove that the proposed method is suitable for the security quantitative analysis of the access control model and evaluation to access control capability in hybrid cloud. 展开更多
关键词 hybrid cloud security entropy classificatory access control model directly unauthorized access right about access indirectly unauthorized access
在线阅读 下载PDF
The Research of Role Tree-Based Access Control Model
2
作者 陆虹 夏天 《Journal of Donghua University(English Edition)》 EI CAS 2010年第2期274-276,共3页
Towards the crossing and coupling permissions in tasks existed widely in many fields and considering the design of role view must rely on the activities of the tasks process,based on Role Based Accessing Control (RBAC... Towards the crossing and coupling permissions in tasks existed widely in many fields and considering the design of role view must rely on the activities of the tasks process,based on Role Based Accessing Control (RBAC) model,this paper put forward a Role Tree-Based Access Control (RTBAC) model. In addition,the model definition and its constraint formal description is also discussed in this paper. RTBAC model is able to realize the dynamic organizing,self-determination and convenience of the design of role view,and guarantee the least role permission when task separating in the mean time. 展开更多
关键词 Role Based accessing control (RBAC) Role Tree-Based access control (RTBAC) models Constraints Permission
在线阅读 下载PDF
Tenant-based access control model for multi-tenancy and sub-tenancy architecture in Software-as-a-Service 被引量:3
3
作者 Qiong zuo Meiyi XIE +1 位作者 Guanqiu QI Hong ZHU 《Frontiers of Computer Science》 SCIE EI CSCD 2017年第3期465-484,共20页
Software-as-a-Service (SaaS) introduces multi- tenancy architecture (MTA). Sub-tenancy architecture (STA), is an extension of MTA, allows tenants to offer services for subtenant developers to customize their app... Software-as-a-Service (SaaS) introduces multi- tenancy architecture (MTA). Sub-tenancy architecture (STA), is an extension of MTA, allows tenants to offer services for subtenant developers to customize their applications in the SaaS infrastructure. In a STA system, tenants can create sub- tenants, and grant their resources (including private services and data) to their subtenants. The isolation and sharing re- lations between parent-child tenants, sibling tenants or two non-related tenants are more complicated than those between tenants in MTA. It is important to keep service components or data private, and at the same time, allow them to be shared, and support application customizations for tenants. To ad- dress this problem, this paper provides a formal definition of a new tenant-based access control model based on administra- tive role-based access control (ARBAC) for MTA and STA in service-oriented SaaS (called TMS-ARBAC). Autonomous areas (AA) and AA-tree are proposed to describe the auton- omy of tenants, including their isolation and sharing relation- ships. Authorization operations on AA and different resource sharing strategies are defined to create and deploy the access control scheme in STA models. TMS-ARBAC model is ap- plied to design a geographic e-Science platform. 展开更多
关键词 Software-as-a-Service (SaaS) multi-tenancy architecture (MTA) sub-tenancy architecture (STA) rolebased access control (RBAC) model tenant-based access control model
原文传递
Specification and Verification of a Topology-Aware Access Control Model for Cyber-Physical Space 被引量:4
4
作者 Yan Cao Zhiqiu Huang +2 位作者 Shuanglong Kan Dajuan Fan Yang Yang 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2019年第5期497-519,共23页
The cyber-physical space is a spatial environment that integrates the cyber and physical worlds to provide an intelligent environment for users to conduct their day-to-day activities. Mobile users and mobile objects a... The cyber-physical space is a spatial environment that integrates the cyber and physical worlds to provide an intelligent environment for users to conduct their day-to-day activities. Mobile users and mobile objects are ubiquitous in this space, thereby exerting tremendous pressure on its security model. This model must ensure that both cyber and physical objects are always handled securely in this dynamic environment. In this paper,we propose a systematic solution to be able to specify security policies of the cyber-physical space and ensure that security requirements hold in these policies. We first formulate a topology configuration model to capture the topology characteristics of the cyber and physical worlds. Then, based on this model, a Topology-Aware CyberPhysical Access Control model(TA-CPAC) is proposed, which can ensure the security of the cyber and physical worlds at the same time by adjusting permission assignment dynamically. Then, the topology configuration and TA-CPAC models are formalized by bigraphs and Bigraph Reactive System(BRS), respectively, allowing us to use model checking to rationalize the consequences of the evolution of topological configurations on the satisfaction of security requirements. Finally, a case study on a building automation access control system is conducted to evaluate the effectiveness of the proposed approach. 展开更多
关键词 cyber-physical space TOPOLOGY CONFIGURATION access control model CHECKING bigraphs
原文传递
A Multi-Tenant Usage Access Model for Cloud Computing 被引量:1
5
作者 Zhengtao Liu Yun Yang +1 位作者 Wen Gu Jinyue Xia 《Computers, Materials & Continua》 SCIE EI 2020年第8期1233-1245,共13页
Most cloud services are built with multi-tenancy which enables data and configuration segregation upon shared infrastructures.It offers tremendous advantages for enterprises and service providers.It is anticipated tha... Most cloud services are built with multi-tenancy which enables data and configuration segregation upon shared infrastructures.It offers tremendous advantages for enterprises and service providers.It is anticipated that this situation will evolve to foster cross-tenant collaboration supported by Authorization as a service.To realize access control in a multi-tenant cloud computing environment,this study proposes a multi-tenant cloud computing access control model based on the traditional usage access control model by building trust relations among tenants.The model consists of three sub-models,which achieve trust relationships between tenants with different granularities and satisfy the requirements of different application scenarios.With an established trust relation in MT-UCON(Multi-tenant Usage Access Control),the trustee can precisely authorize cross-tenant accesses to the trustor’s resources consistent with constraints over the trust relation and other components designated by the trustor.In addition,the security of the model is analyzed by an information flow method.The model adapts to the characteristics of a dynamic and open multi-tenant cloud computing environment and achieves fine-grained access control within and between tenants. 展开更多
关键词 Multi-tenant usage access control model cloud computing
在线阅读 下载PDF
Virus spreading in wireless sensor networks with a medium access control mechanism 被引量:4
6
作者 王亚奇 杨晓元 《Chinese Physics B》 SCIE EI CAS CSCD 2013年第4期70-74,共5页
In this paper, an extended version of standard susceptible-infected (SI) model is proposed to consider the influence of a medium access control mechanism on virus spreading in wireless sensor networks. Theoretical a... In this paper, an extended version of standard susceptible-infected (SI) model is proposed to consider the influence of a medium access control mechanism on virus spreading in wireless sensor networks. Theoretical analysis shows that the medium access control mechanism obviously reduces the density of infected nodes in the networks, which has been ignored in previous studies. It is also found that by increasing the network node density or node communication radius greatly increases the number of infected nodes. The theoretical results are confirmed by numerical simulations. 展开更多
关键词 wireless sensor networks medium access control virus spreading susceptible-infected model
原文传递
Remote Attestation-Based Access Control on Trusted Computing Platform
7
作者 LIU Xian'gang ZHANG Xing FU Yingfang SHEN Changxiang 《Wuhan University Journal of Natural Sciences》 CAS 2010年第3期190-194,共5页
Existing remote attestation schemes based on trusted computing have some merits on enhancing security assurance level, but they usually do not integrate tightly with the classical system security mechanism. In this pa... Existing remote attestation schemes based on trusted computing have some merits on enhancing security assurance level, but they usually do not integrate tightly with the classical system security mechanism. In this paper, we present a component named remote attestation-based access controller (RABAC), which is based on a combination of techniques, such as random number, Bell-La Padula (BLP) model, user identity combined with his security properties and so on. The component can validate the current hardware and software integrity of the remote platform, and implement access control with different security policy. We prove that the RABAC can not only improve the security of transferred information in remote attestation process but also integrate remote attestation and classical system security mechanism effectively. 展开更多
关键词 trusted computing remote attestation access control security model
原文传递
Experience-Based Access Control in UbiComp: A New Paradigm
8
作者 Nalini A. Mhetre Arvind V. Deshpande Parikshit N. Mahalle 《Journal of Computer and Communications》 2022年第1期133-157,共25页
Experience is a sociological concept and builds over time. In a broader sense, the human-centered equivalents of experience and trust apply to D2D interaction. Ubiquitous computing (UbiComp) embeds intelligence and co... Experience is a sociological concept and builds over time. In a broader sense, the human-centered equivalents of experience and trust apply to D2D interaction. Ubiquitous computing (UbiComp) embeds intelligence and computing capabilities in everyday objects to make them effectively communicate, share resources, and perform useful tasks. The safety of resources is a serious problem. As a result, authorization and access control in UbiComp is a significant challenge. Our work presents experience as an outcome of history (HI), reliability (RL), transitivity (TR), and Ubiquity (UB). This experience model is easily adaptable to a variety of self-regulating context-aware access control systems. This paper proposes a framework for Experience-Based Access Control (EX-BAC) with all major services provided by the model. EX-BAC extends attribute-based access control. It uses logical device type and experience as context parameters for policy design. When compared with the state-of-the-art, EX-BAC is efficient with respect to response time. 展开更多
关键词 access control Experience-Based access control Experience model History Reliability TRANSITIVITY Ubiquitous Computing Ubiquity
在线阅读 下载PDF
Mobility Conscious Medium Access Control Scheme for Wireless Sensor Networks: A Conceptual Approach
9
作者 Adeniran Ishola Oluwaranti Tayo Dorcas Obasanya 《Wireless Sensor Network》 2014年第7期129-135,共7页
Mobility in Wireless Sensor Network (WSN) presents distinctive challenges in Medium Access Control (MAC) scheme. Numerous MAC protocols for sensor networks assume that sensor nodes are static and focus primarily on en... Mobility in Wireless Sensor Network (WSN) presents distinctive challenges in Medium Access Control (MAC) scheme. Numerous MAC protocols for sensor networks assume that sensor nodes are static and focus primarily on energy efficiency. This work seeks to develop an improved mobility conscious medium access control scheme for wireless sensor networks with a view to enhance energy conservation on mobile sensor nodes. On this note, mobility patterns of different scenarios are modelled using Gauss Markov Mobility Model (GMMM) to determine the position and distance of the sensor nodes and how they are correlated in time. 展开更多
关键词 MOBILITY Medium access control Wireless Sensor Networks GAUSS MARKOV MOBILITY model
在线阅读 下载PDF
面向多元时序大数据的用户访问控制模型构建
10
作者 高鹏 朱晓丽 《陇东学院学报》 2025年第2期27-31,共5页
考虑到用户访问网络时产生的时序大数据存在差异,容易出现个人信息泄露风险,为了提高用户访问的安全性,提出面向多元时序大数据的用户访问控制模型构建研究。通过用户访问行为中多元时序大数据的分块处理,分析用户访问行为的时序组成,... 考虑到用户访问网络时产生的时序大数据存在差异,容易出现个人信息泄露风险,为了提高用户访问的安全性,提出面向多元时序大数据的用户访问控制模型构建研究。通过用户访问行为中多元时序大数据的分块处理,分析用户访问行为的时序组成,根据时序数据的分类情况,挖掘出用户访问行为的多元时序大数据。基于用户访问节点的合并过程,计算出用户在访问链路上的隐私度,根据用户在链路所有节点产生的隐私度,计算用户成功访问网络时的节点隐私度。利用模糊综合评价的方法,计算出用户信誉的隶属度向量,引入模糊化的方式对用户信誉的综合判定矩阵进行转换,得到用户整体信誉在不同级别下的隶属情况,当网络对用户产生一定信誉之后,构建用户访问控制模型,实现用户访问的控制。实验结果表明,该模型能够控制用户的访问行为,通过降低网络数据的泄露数量和提高授权效率,提高用户访问的安全性。 展开更多
关键词 时序大数据 用户访问 数据挖掘 隐私度 访问控制 控制模型
在线阅读 下载PDF
Study on Mandatory Access Control in a Secure Database Management System
11
作者 ZHU Hong, FENG Yu cai School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan 430074, China 《Journal of Shanghai University(English Edition)》 CAS 2001年第4期299-307,共9页
This paper proposes a security policy model for mandatory access control in class B1 database management system whose level of labeling is tuple. The relation hierarchical data model is extended to multilevel relatio... This paper proposes a security policy model for mandatory access control in class B1 database management system whose level of labeling is tuple. The relation hierarchical data model is extended to multilevel relation hierarchical data model. Based on the multilevel relation hierarchical data model, the concept of upper lower layer relational integrity is presented after we analyze and eliminate the covert channels caused by the database integrity. Two SQL statements are extended to process polyinstantiation in the multilevel secure environment. The system is based on the multilevel relation hierarchical data model and is capable of integratively storing and manipulating multilevel complicated objects ( e.g., multilevel spatial data) and multilevel conventional data ( e.g., integer, real number and character string). 展开更多
关键词 multilevel relation hierarchical data model covert channels mandatory access control POLYINSTANTIATION hierarchical classification non hierarchical category security level multilevel relation hierarchical instance integrity cluster
在线阅读 下载PDF
基于零信任的网络安全模型架构及其应用
12
作者 王长杰 《清远职业技术学院学报》 2025年第4期68-75,共8页
由于云计算、远程访问技术的广泛应用,网络边界变得日益模糊,加之网络攻击行为的复杂性和手段的多样性,传统基于边界防护的网络安全架构暴露出防护能力不足和局限性,无法满足当前网络安全防护要求。零信任网络安全模型采用以身份认证为... 由于云计算、远程访问技术的广泛应用,网络边界变得日益模糊,加之网络攻击行为的复杂性和手段的多样性,传统基于边界防护的网络安全架构暴露出防护能力不足和局限性,无法满足当前网络安全防护要求。零信任网络安全模型采用以身份认证为中心的安全保护模式,使访问行为更加安全可信。本文在对传统网络架构及安全隐患介绍的基础上,阐述零信任网络安全架构技术和核心思想,设计出包括控制层面、数据层面、访问主体、访问客体四部分的零信任网络安全应用模型总体架构,并提出在远程移动办公和云计算应用场景中的可行性解决方案,确保网络中各类资源能够可信可控地被访问。 展开更多
关键词 零信任 身份认证 动态访问控制 网络安全模型
在线阅读 下载PDF
支持上下文感知的图结构混合访问控制模型
13
作者 陈函 袁凌云 +2 位作者 张黔会 戴晖 保昊辰 《计算机应用研究》 北大核心 2025年第5期1490-1499,共10页
针对现有访问控制模型在高负载情况下性能不足、缺乏对上下文信息的综合考虑等问题,提出一种支持上下文感知的图结构访问控制模型G-RABAC(graph-based role and attribute-based access control)。首先,G-RABAC结合RBAC(role-based acce... 针对现有访问控制模型在高负载情况下性能不足、缺乏对上下文信息的综合考虑等问题,提出一种支持上下文感知的图结构访问控制模型G-RABAC(graph-based role and attribute-based access control)。首先,G-RABAC结合RBAC(role-based access control)与ABAC(attribute-based access control)模型,将基于ABAC的访问控制策略可视化为授权图,定义角色间的关系为特殊的主体属性,实现了属性和上下文信息的高效管理。其次,构建了基于G-RABAC的访问控制框架,并设计了基于上下文的访问控制决策算法和风险感知算法,实现了支持多维上下文感知的访问控制。在此基础上,集成区块链和G-RABAC模型,设计了用户身份合法性验证合约,结合Web3.0技术有效监控和处理用户访问行为,提升了访问控制的安全性和透明性。实验结果表明,G-RABAC模型的访问控制效率显著提升,与所选基线方案相比,访问控制时间开销基本维持在230 ms以内,且能够在多用户并发场景中支持安全且细粒度的访问控制,具备更高的灵活性和扩展性。 展开更多
关键词 混合访问控制 图模型 上下文感知 区块链
在线阅读 下载PDF
Analysis and Application for Integrity Model on Trusted Platform
14
作者 TU Guo-qing ZHANG Huan-guo +1 位作者 WANG Li-na YU Dan-dan 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期35-38,共4页
To build a trusted platform based on Trusted Computing Platform Alliance(TCPA)'s recommendation,we analyze the integrity mechanism for such a PC platfoim in this paper.By combinning access control model with infor... To build a trusted platform based on Trusted Computing Platform Alliance(TCPA)'s recommendation,we analyze the integrity mechanism for such a PC platfoim in this paper.By combinning access control model with information flow model,we put forwarda combinedprocess-based lattice model to enforce security This moelel creates a trust chain by which we canmanage a series of processes from a core root of trust module to some other application modules Inthe model,once the trust chain is created andmanaged cor-rectly,the integrity of the computer'shardware and sofware has bctn maintained,so does the confidentiality and authenticity.Moreover,arelevant implementation of the model is explained. 展开更多
关键词 tiusted computing access control model information flow model trust chain INTEGRITY
在线阅读 下载PDF
场景驱动的电力数据中台数据动态访问控制模型
15
作者 周小明 周辰语 +2 位作者 许超 魏思佳 冉冉 《计算机技术与发展》 2025年第6期214-220,共7页
电力系统数据中台整合了国家电力系统的核心数据,通过整合、清洗、存储和融合提供高质量的数据共享服务。电力数据中台具有数据安全等级高、访问终端数量大、数据运维频度高、数据分析维度广等特点。传统的静态访问控制模型无法阻止身... 电力系统数据中台整合了国家电力系统的核心数据,通过整合、清洗、存储和融合提供高质量的数据共享服务。电力数据中台具有数据安全等级高、访问终端数量大、数据运维频度高、数据分析维度广等特点。传统的静态访问控制模型无法阻止身份合法用户的错误和非法操作,基于用户的动态访问行为,智能识别系统访问威胁并开展动态安全访问控制是保护数据中台安全的重要方法。该文基于ABAC访问控制模型,提出一种场景驱动的电力数据中台数据动态访问控制模型。该模型通过提取用户访问请求的业务特征和数据特征,构建数据访问场景,通过对每种场景类型进行安全风险分析,得出同类型场景的防护侧重点,并依据场景中具体属性值,计算场景的安全评分,最终得到针对该场景的访问策略,以此实现动态场景下灵活、细粒度的访问控制管理,契合访问控制零信任的理念。 展开更多
关键词 数据中台 访问控制模型 安全风险分析 动态保护 访问控制策略
在线阅读 下载PDF
AI赋能6G网络安全:架构与关键技术 被引量:1
16
作者 王瀚洲 金子安 +1 位作者 王瑞 刘建伟 《中兴通讯技术》 北大核心 2025年第3期31-38,共8页
针对6G网络架构中的需求与挑战,探讨了“主动免疫-孪生互驱-弹性自治-分布协同”的智慧内生安全架构。该架构通过预训练威胁表征模型实现攻击前预判,利用数字孪生构建虚实结合防御体系,借助联邦学习与区块链技术建立跨域协同机制,形成... 针对6G网络架构中的需求与挑战,探讨了“主动免疫-孪生互驱-弹性自治-分布协同”的智慧内生安全架构。该架构通过预训练威胁表征模型实现攻击前预判,利用数字孪生构建虚实结合防御体系,借助联邦学习与区块链技术建立跨域协同机制,形成“感知-决策-验证-优化”的安全闭环。介绍了5项6G网络安全中的关键技术:分布式机器学习、AI大模型、轻量级认证授权与访问控制、数字孪生、无线物理层安全技术,为6G网络的高效可信运行提供理论支撑与技术路径分析。 展开更多
关键词 6G网络安全 人工智能 分布式机器学习 大模型 轻量级认证授权与访问控制 数字孪生 无线物理层安全
在线阅读 下载PDF
基于零信任架构的医院内网访问控制模型设计研究
17
作者 韩瑞泽 伦怡葱 徐建昭 《信息与电脑》 2025年第17期83-85,共3页
当前,医院内网访问控制依赖传统的边界安全策略。该策略难以有效应对内部威胁、设备失陷及高级持续性攻击,致使敏感医疗数据面临较高的泄露风险。为解决这一问题,文章提出基于零信任架构(Zero Trust Architecture,ZTA)的医院内网访问控... 当前,医院内网访问控制依赖传统的边界安全策略。该策略难以有效应对内部威胁、设备失陷及高级持续性攻击,致使敏感医疗数据面临较高的泄露风险。为解决这一问题,文章提出基于零信任架构(Zero Trust Architecture,ZTA)的医院内网访问控制模型设计研究,构建以多因素身份验证、动态访问控制、持续信任评估为核心的安全体系,旨在通过该模型的实际应用,显著降低未授权访问风险,提升医院内网安全性,优化合规管理流程。 展开更多
关键词 零信任架构 医院内网 访问控制模型
在线阅读 下载PDF
基于隐私集合求交的大模型双向隐私授权
18
作者 杨帅 韩益亮 +2 位作者 吴旭光 冯浩康 王圆圆 《网络与信息安全学报》 2025年第5期101-114,共14页
针对大语言模型多模态接入场景面临的隐私泄露风险,以及传统基于角色和属性的访问控制模型在用户属性多元、访问规模大时难以实现细粒度隐私管控的问题,提出一种基于布谷鸟混淆布隆过滤器的隐私集合求交协议,并构建支持隐私保护的属性... 针对大语言模型多模态接入场景面临的隐私泄露风险,以及传统基于角色和属性的访问控制模型在用户属性多元、访问规模大时难以实现细粒度隐私管控的问题,提出一种基于布谷鸟混淆布隆过滤器的隐私集合求交协议,并构建支持隐私保护的属性访问控制框架。首先,设计布谷鸟混淆布隆过滤器结构,通过引入多重哈希链机制降低元素插入时的碰撞概率,并采用异或操作对过滤器内元素的存储位置进行混淆处理,进一步增强其抗攻击能力;其次,基于该过滤器构建两方隐私集合求交协议,在标准半诚实模型下实现了单轮通信开销;最后,结合基于属性的访问控制模型,设计具备双向隐私验证能力的访问控制框架,利用隐私集合求交技术实现访问策略与用户属性信息的双向隐私保护。实验结果表明,在属性数量为200、并发访问量为10万的场景下,所提方案的策略验证耗时相较于基于椭圆曲线密码的密文策略属性加密(CP-ABC)方案降低约55%,显著提升了高并发访问场景下的处理效率,为大语言模型多模态接入场景提供了兼顾安全与性能的隐私保护方案。 展开更多
关键词 隐私集合求交 属性访问控制 隐私保护 大语言模型
在线阅读 下载PDF
基于智能算法的大型电力系统动态访问自动化控制优化研究
19
作者 陈识微 蒋鲁军 沈莹 《电子设计工程》 2025年第12期115-119,共5页
为快速识别大型电力系统动态访问用户身份合法性,优化大型电力系统动态访问自动化控制效果,设计基于智能算法的大型电力系统动态访问自动化控制优化方法。在系统动态访问授权过程中,构建基于APODAC模型的访问控制方法,提取用户对大型电... 为快速识别大型电力系统动态访问用户身份合法性,优化大型电力系统动态访问自动化控制效果,设计基于智能算法的大型电力系统动态访问自动化控制优化方法。在系统动态访问授权过程中,构建基于APODAC模型的访问控制方法,提取用户对大型电力系统的动态访问行为序列信息,利用智能算法中的模糊神经理论与麻雀搜索算法,构建基于智能算法的访问身份风险量化模型。经测试,此方法快速完成并发用户身份的动态访问控制,能够动态更新其访问控制规则,量化用户对大型电力系统动态访问风险,优化了大型电力系统动态访问自动化控制效果。 展开更多
关键词 智能算法 大型电力系统 动态访问控制 APODAC模型 自适应模糊神经理论 麻雀搜索算法
在线阅读 下载PDF
基于访问策略控制的主动式网络信息安全应急联动模型
20
作者 张宇 万军 陈承斌 《计算机测量与控制》 2025年第3期167-175,共9页
为了应对网络信息安全事件,最大程度的降低入侵攻击对网络信息产生的负面影响,降低网络信息丢包率和错误率,提出基于访问策略控制的主动式网络信息安全应急联动模型。捕获主动式网络数据包,以此作为模型的输入项;采用特征提取与匹配的方... 为了应对网络信息安全事件,最大程度的降低入侵攻击对网络信息产生的负面影响,降低网络信息丢包率和错误率,提出基于访问策略控制的主动式网络信息安全应急联动模型。捕获主动式网络数据包,以此作为模型的输入项;采用特征提取与匹配的方式,检测网络信息的安全状态,根据状态检测结果判断模型程序是否启动;根据网络攻击信号的强度特征,追踪主动式网络信息攻击源与路径,从网络节点功率、节点容量、资源可用性等方面设置模型约束条件,通过访问策略控制、信息攻击防御、信息恢复3个步骤,实现模型主动式网络信息安全应急联动功能;通过模型验证实验得出结论:与传统应急联动模型相比,在优化设计模型作用下,主动式静态网络和动态网络的丢包率分别降低3.04%和3.53%,网络信息错误率分别减小5.445%和6.07%,由此证明优化设计的安全应急联动模型具有更高的应用价值。 展开更多
关键词 访问策略控制 主动式网络 信息安全 应急联动模型
在线阅读 下载PDF
上一页 1 2 35 下一页 到第
使用帮助 返回顶部