Access Control Capability Assessment Method Based on Security Entropy

نویسندگان

  • Tianwei Che
  • Jianfeng Ma
  • Na Li
  • Chao Wang
چکیده

In this paper, we propose analysis methods based on security entropy to overcome the problem of quantitative analysis, after going through the study of access control capability assessment for computer information system. At First, we computed the uncertainty how system determine irregular access behavior using the security entropy theory. Next, we defined the security theorem of classificatory information system, and proposed the standard of access control capability. Finally, we analyzed the typical access control models using the methods, and compared security and applicability of them. It proved that the method is appropriate for security quantitative analysis of access control model and for the evaluation of access control capability in information system.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Security Quantitative Analysis Method For Access Control Based on Security Entropy

This paper has proposed a quantitative analysis method based on security entropy to work out the problem of quantitative analysis in classificatory information systems. Firstly, the security theorems of classificatory information systems have been defined, the uncertainty for the system’s determinations on the irregular access behaviors by means of the theory of security entropy have been calcu...

متن کامل

Privacy Preserving Dynamic Access Control Model with Access Delegation for eHealth

eHealth is the concept of using the stored digital data to achieve clinical, educational, and administrative goals and meet the needs of patients, experts, and medical care providers. Expansion of the utilization of information technology and in particular, the Internet of Things (IoT) in eHealth, raises various challenges, where the most important one is security and access control. In this re...

متن کامل

Multilevel Thresholding Approach Using Modified Bacterial Foraging Optimization

REGULAR PAPERS Multilevel Thresholding Approach Using Modified Bacterial Foraging Optimization Kezong Tang, Zuoyong Li, Jun Wu, and Tong Zhang A Phrase Table Filtering Model Based on Binary Classification for Uyghur-Chinese Machine Translation Chenggang Mi, Yating Yang, Xi Zhou, Lei Wang, Xiao Li, and Eziz Tursun A Hybrid Optimization Algorithm for Bayesian Network Structure Learning Based on D...

متن کامل

An Access Control Method based on Scenario Trust

Access control is an important element in network security. Meanwhile, trust provides a new direction for access control in open network environments. Based on the dynamic nature of trust, we study the temporal and spatial characteristics in the security of society and propose the concept of scenario trust in which we consider four factors: access time, place, history behavior and risk control ...

متن کامل

Research on Cloud Security Risk Assessment based on Fuzzy Entropy Weight Model

A method of cloud security risk assessment based on fuzzy entropy weight is proposed. In this framework, seven aspects of cloud security risk assessment indicators are set up, include the virtualization, data security, infrastructure, applications, soft environment, cloud services and security management. The simulation results show that the fuzzy entropy weight method is effective for the clou...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • JCP

دوره 9  شماره 

صفحات  -

تاریخ انتشار 2014