Access Control Capability Assessment Method Based on Security Entropy
نویسندگان
چکیده
In this paper, we propose analysis methods based on security entropy to overcome the problem of quantitative analysis, after going through the study of access control capability assessment for computer information system. At First, we computed the uncertainty how system determine irregular access behavior using the security entropy theory. Next, we defined the security theorem of classificatory information system, and proposed the standard of access control capability. Finally, we analyzed the typical access control models using the methods, and compared security and applicability of them. It proved that the method is appropriate for security quantitative analysis of access control model and for the evaluation of access control capability in information system.
منابع مشابه
A Security Quantitative Analysis Method For Access Control Based on Security Entropy
This paper has proposed a quantitative analysis method based on security entropy to work out the problem of quantitative analysis in classificatory information systems. Firstly, the security theorems of classificatory information systems have been defined, the uncertainty for the system’s determinations on the irregular access behaviors by means of the theory of security entropy have been calcu...
متن کاملPrivacy Preserving Dynamic Access Control Model with Access Delegation for eHealth
eHealth is the concept of using the stored digital data to achieve clinical, educational, and administrative goals and meet the needs of patients, experts, and medical care providers. Expansion of the utilization of information technology and in particular, the Internet of Things (IoT) in eHealth, raises various challenges, where the most important one is security and access control. In this re...
متن کاملMultilevel Thresholding Approach Using Modified Bacterial Foraging Optimization
REGULAR PAPERS Multilevel Thresholding Approach Using Modified Bacterial Foraging Optimization Kezong Tang, Zuoyong Li, Jun Wu, and Tong Zhang A Phrase Table Filtering Model Based on Binary Classification for Uyghur-Chinese Machine Translation Chenggang Mi, Yating Yang, Xi Zhou, Lei Wang, Xiao Li, and Eziz Tursun A Hybrid Optimization Algorithm for Bayesian Network Structure Learning Based on D...
متن کاملAn Access Control Method based on Scenario Trust
Access control is an important element in network security. Meanwhile, trust provides a new direction for access control in open network environments. Based on the dynamic nature of trust, we study the temporal and spatial characteristics in the security of society and propose the concept of scenario trust in which we consider four factors: access time, place, history behavior and risk control ...
متن کاملResearch on Cloud Security Risk Assessment based on Fuzzy Entropy Weight Model
A method of cloud security risk assessment based on fuzzy entropy weight is proposed. In this framework, seven aspects of cloud security risk assessment indicators are set up, include the virtualization, data security, infrastructure, applications, soft environment, cloud services and security management. The simulation results show that the fuzzy entropy weight method is effective for the clou...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- JCP
دوره 9 شماره
صفحات -
تاریخ انتشار 2014