全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...
电子学报  2013 

基于加权熵的访问控制策略安全性分析研究

DOI: 10.3969/j.issn.0372-2112.2013.01.009, PP. 47-51

Keywords: 加权熵,策略安全熵,安全策略,自主访问控制策略,强制访问控制策略

Full-Text   Cite this paper   Add to My Lib

Abstract:

为解决访问控制策略的安全性分析问题,提出了一种基于信息熵的策略量化分析理论.首先,根据信息论中加权熵的知识定义了策略安全熵,提出了非授权访问行为的最大不确定性计算方法.然后,分别给出了典型访问控制策略的一维安全熵和N维安全熵,并对结果进行了证明.最后,依据安全熵分析了典型访问控制策略的安全性.

References

[1]  张红旗,王鲁.信息安全技术.北京: 高等教育出版社,2008.ZHANG Hong-qi,WANG Lu.Information Security Technology [M].Beijing: Higher Education Press,2008.(in Chinese)
[2]  Shannon C E.A mathematical theory of communication [J].Bell System Technical Journal,1948,26(3): 379-423,623-656.
[3]  傅祖芸.信息论—基础理论与应用[M].北京: 电子工业出版社,2007.
[4]  丁晓青,吴佑寿.模式识别统一熵理论[J].电子学报,1993,21(8): 1-8.DING Xiao-qing,WU You-shou.Unify entropy theory for pattern recognition [J].Acta Electronica Sinica,1993,21(8): 1-8.(in Chinese)
[5]  扬明.决策表中基于条件信息熵的近似约简[J].电子学报,2007,35(11): 2156-2160.YANG Ming.Approximate reduction based on conditional information entropy in decision table [J].Acta Electronica Sinica,2007,35(11): 2156-2160.(in Chinese)
[6]  Morio J,et a1.A characterization of Shannon entropy and Bhattacharyya measure of contrast in polarimetric and interferometric SAR image [J].Proceedings of the IEEE,2009,97(6): 1097- 1108.
[7]  付钰,吴晓平,叶清等.基于模糊集与熵权理论的信息系统安全风险评估研究[J].电子学报,2010,38(7): 1489-1494.FU Yu,WU Xiao-ping ,YE Qing et al.An Approach for information systems security risk assessment on fuzzy set and entropy-weigh[J].Acta Electronica Sinica,2010,38(7): 1489-1494.(in Chinese)
[8]  赵冬梅,马建峰,王跃生.信息系统的模糊风险评估模型[J].通信学报,2007,28(4): 51-56.ZHAO Dong-mei,MA Jian-feng,WANG Yue-sheng.Model of fuzzy risk assessment of the information system [J].Journal on Communication,2007,28(4): 51-56.(in Chinese)
[9]  张义荣,鲜明,王国玉.一种基于网络熵的计算机网络攻击效果定量评估方法[J].通信学报,2004,25(11): l58-165.ZHANG Yi-rong,XIAN Ming,WANG Guo-yu.A quantitative evaluation technique of attack effect of computer network based on network entropy [J].Journal on Communications,2004,25(11): 158-l65.(in Chinese)
[10]  王栋,潘少明,吴吉春 等.确定风险分析先验概率分布的最大熵方法[J].应用基础与工程科学学报,2006,14(Sup): 318-325.WANG Dong,PAN Shao-ming,et a1.Deriving the prior probability distribution of risk analysis with the use of the principle of maximum entropy [J].Journal of Basic Science and Engineering,2006,14(Sup): 318-325.(in Chinese)
[11]  胡 俊,沈昌祥,张 兴.一种BLP模型的量化分析方法[J].小型微型计算机系统,2009,30(8): 1605-1610.HU Jun,SHEN Chang-xiang,ZHANG Xing.Quantitative analysis method to BLP model [J].Journal of Chinese Computer Systems,2009,30(8): 1605-1610.(in Chinese)
[12]  D Denning.A lattice model of secure information flow [J].Communications of the ACM,l976,l9(5): 236-243.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133