期刊文献+

基于RBAC数据库的误用检测模型 被引量:1

A Misuse Detection Model on RBAC Database
下载PDF
导出
摘要 为进一步提高RBAC(Role Based Access Control)数据库的安全性,提出构建以角色为基础的误用检测模型.通过对审计日志的形式化定义来实现对原始审计数据的预处理,利用对记录项的支持率、距离值等参数的聚类来生成轮廓文件的方法,并由轮廓文件给出了该模型的安全审计规则.研究表明:以角色为基础的误用检测模型可以有效地控制来自数据库内部人员的滥用职权. To further improve the database security of the role based access control (RBAC), the author proposes a misuse detection model based on access control role. Firstly, the preprocessing of raw data by the formal definitions of audit log is analysed. Secondly, the generation and implementation of the framework based on the cluster technique using supporting rate and distance value of records item is described. Audit rules of the RBAC database security according to framework file generated in the above process are set up. Lastly, empirical result shows that the model can effectively control the abuse activities of internal database administrators.
作者 何淑娟
出处 《西安工业大学学报》 CAS 2009年第4期365-370,共6页 Journal of Xi’an Technological University
关键词 RBAC数据库 误用检测模型 轮廓文件 安全审计规则 RBAC database a misuse detection model framework file security audit rules
  • 相关文献

参考文献11

  • 1Carter D L,Katz A J. Computer Crime: An Emerging Challenge for Law Enforcement[EB/OL]. (1996-12- 1) [ 2009 - 04 - 05 ] http ://findartieles. corn/p/articles/ mi_m2194/is n12_v65/ai_19102819/? tag= content;coll. 被引量:1
  • 2Chung C Y, Gertz M , Levitt K. DEMIDS: A Misuse Detection System for Database Systems [M]. Norwell. Kluwer Academic Publishers, 2000. 被引量:1
  • 3黄晓燕,许龙飞.数据库入侵检测的一种数据挖掘方法[J].计算机系统应用,2005,14(11):49-52. 被引量:3
  • 4史美林,钱俊,董永乐.入侵检测技术与其发展趋势[J].信息安全与通信保密,2002(5):12-16. 被引量:12
  • 5Sandhu, Coyne E J, Feinstein H L. Role-based Access Control Models[J]. IEEE Computer, 1996,29(2) : 38. 被引量:1
  • 6Youman C E, Sandhu R S, Coyne E J. Rationale for the RBAC96 Family of Access Control Models[C]// Proceedings of the 1st ACM Workshop on Role-Based Access Control. New York: ACM, 1996. 被引量:1
  • 7Sandhu R, Bhamidipati V, Munawer Q. The AR- BAC97 Model for Role-Based Administration of Roles [J]. ACM Transactions on Information and System Security, 1999,2 (1): 105. 被引量:1
  • 8Sandhu R, Bhamidipati. Role-Based Administration of User-Role Assignment: The URA97 Model and Its Oracle Implementation[J]. Journal of Computer Security, 1999(7):176. 被引量:1
  • 9赵宝献,秦小麟.数据库访问控制研究综述[J].计算机科学,2005,32(1):88-91. 被引量:17
  • 10Ferraiolo D F, Sandhu R, Gavrila S. Proposed NIST Standard for Role;based Access Control [J ]. ACM Transaction on Information and System Security, 2001,4(3) :224. 被引量:1

二级参考文献32

  • 1Sandhu R,Jajodia S. Data and Database Security and Controls.Handbook of Information Security Management, Auerbach Publishers, 1993. 481~ 499 被引量:1
  • 2Ferraiolo D F,Cugini J, Kuhn D R. Role Based Access Control:Features and Motivations. In: Computer Security Applications Conf. 1995 被引量:1
  • 3Sandhu R. Relational Database Access Controls. Handbook of Informantion Secutrity Management(1992-95 Yearbook),Auerbach Publishers, 1994. 145 ~ 160 被引量:1
  • 4Sandhu R. Mandatory Controls For Database Integrity. In:Proc.of the IFIP WG11. 3 Workshop on Database Security,Monterey,Colifornia ,Sep. 1989 被引量:1
  • 5American National Standard for Information Technolology. Role Based Access Control. Information Technology Industry Council (ITI),Draft, Apr. 2003 被引量:1
  • 6Ferraiolo D F,et al. Proposed NIST Standard for Role-Based Access Control. ACM Transaction on Information and System Security,2001,4(3): 224~274 被引量:1
  • 7Graubart,Richard. On the Need for a Third Form of Access Control. In: Proc. of the 12th National Computing Security Conf.1989. 296~303 被引量:1
  • 8Sandhu R,Chen F. The Multilevel Relational (MLR) Data Model. ACM Transactions on Information and System Security, 1998,1(1):93~132 被引量:1
  • 9Park J,Sandhu R. Towards Usage Control Models: Beyond Traditional Access Control. SACMAT02, Monterey, Califomia, USA,ACM, 2002 被引量:1
  • 10Park J,Sandhu R. Originator Control in Usage Contrlol. In:3rd International Workshop on Policies for Distributed Systems and Networks(Policy02). June 2002 被引量:1

共引文献29

同被引文献2

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部