Reinforcing Access Control Using Fuzzy Relation Equations
نویسندگان
چکیده
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted access permission to all resources assigned to the user that they claim to be. However, numerous studies have shown that most security breaches are done by unauthorized users impersonating as authorized users (e.g. by cracking or stealing passwords) or by circumventing the authentication system altogether (by exploiting security “holes” in the system). Once the authentication system is broken, the system and the information kept in it become wide open to unauthorized access and malicious usage. Moreover, because of the interdependencies among the various (computer and telecommunication) components of a distributed system, a security breach to one component can have repercussions throughout the system. The main objective of this paper is to present new security model that provides additional level of security checks based on heuristic information kept about various system components. The model allows a local host to evaluate and determine whether a remote request should be granted based on such information as the sensitivity level of the data being effected by the request, the type of request being made, and the probability of hostility of the user making the request. Typically, such information is very difficult to determine precisely since it depends on other attributes that are themselves imprecise or only partially known. The paper presents an algorithm for generating such fuzzy information based on their dependent attributes. The method is based on using basic rules of fuzzy set theory to establish a fuzzy relation between a set of dependent fuzzy quantities. The established relation can also be updated and adapted as the base information changes.
منابع مشابه
Fuzzy relation equations and approximate solutions. Some recent results
For theoretical fuzzy control it is a well known strategy to transform a system of control rules into a system of relation equations. Because these systems of relation equations are not always solvable, solvability criteria and approximate solutions have been discussed. We reconsider some of the results in this field and extend them using more recent results on t-norm based fuzzy logics and on ...
متن کاملConcept Lattices in Fuzzy Relation Equations
Fuzzy relation equations are used to investigate theoretical and applicational aspects of fuzzy set theory, e.g., approximate reasoning, time series forecast, decision making and fuzzy control, etc.. This paper relates these equations to a particular kind of concept lattices.
متن کاملApproximating Fuzzy Control Strategies via CRI
We start from the observation that Zadeh’s compositional rule of inference (CRI) is a strategy to determine approximately a roughly given control function. From this point of view the problem to solve a system of fuzzy relation equations also becomes the problem to determine approximately such a control strategy. This gives a natural interpretation for approximate solutions of unsolvable system...
متن کاملSolving interval-valued fuzzy relation equations
From the algorithm procedure presented in section 4 and the examples in this section, we can nd out it is easy to solve interval valued fuzzy relation equations by using fuzzy relation inequality system (8). The computation complexity of this algorithm is as same as that of the more commonly used algorithm 5] for fuzzy relation equations (1). So, the problem is more complicated than constant fu...
متن کاملPosynomial geometric programming problem subject to max–product fuzzy relation equations
In this article, we study a class of posynomial geometric programming problem (PGPF), with the purpose of minimizing a posynomial subject to fuzzy relational equations with max–product composition. With the help of auxiliary variables, it is converted convert the PGPF into an equivalent programming problem whose objective function is a non-decreasing function with an auxiliary variable. Some pr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006