期刊文献+

基于聚类分析的客体聚合信息级别推演方法 被引量:6

A Level Inference Method for Aggregated Information of Objects Based on Clustering Analysis
下载PDF
导出
摘要 多级客体关系的复杂性,使得等级化网络存在着客体聚合引起信息泄露的问题。针对这一问题,该文提出了基于聚类分析的客体资源聚合信息级别的推演方法,首先依据属性重要程度,对客体属性进行约简,形成属性矢量;然后通过形式概念分析,计算概念引力,对同一安全域内的客体资源进行相似性分析,实现客体资源聚类;最后,依据属性或属性子集级别模糊集可能性测度,推演出由同类客体推导出更高级别信息的可能性。通过该方法,能够有效地制定等级化网络区域边界访问控制策略,控制主体对同一类客体的受限访问,从而降低信息系统失泄密的风险。 The relations among objects with secure level are very complex,which leads to the problems of security in multi-level network,such as information leakage by object aggregation.This paper puts forward a level inference method for aggregated information of objects based on clustering analysis.This method makes the reduction of attributes by the importance degree of attribute in one object,and attribute vector is formed.Then,according to formal concept analysis,this method accomplishes comparability analysis of objects in the same secure domain by gravity among concepts so that objects can be aggregated.Finally,according to probability estimate of fuzzy set about secure level of attributes or sets of attribute,probability of higher level information inferred by aggregation of similar objects is computed,which may effectively establish access control policy in multi-level network,and accomplish restricted access of congeneric objects in order to reduce the risk of information system.
出处 《电子与信息学报》 EI CSCD 北大核心 2012年第6期1432-1437,共6页 Journal of Electronics & Information Technology
基金 国家973计划前期研究专项(2011CB311801) 河南省杰出科技创新人才计划(114200510001h)资助课题
关键词 信息安全 等级保护 客体聚合 概念分析 级别推演 Information security Classified security protection Object aggregation Concept analysis Level inference
  • 相关文献

参考文献12

  • 1Bell P D E and Padula L J L. Secure computer system: unified exposition and multics interpretation, ESD-TR-75- 306[R]. MTR 2997 Rev.1, The MITRE Corporation, 1976. 被引量:1
  • 2秦超,陈钟,段云所.Chinese Wall策略及其在多级安全环境中的扩展[J].北京大学学报(自然科学版),2002,38(3):369-374. 被引量:8
  • 3Pernul G, Winiwarter W, and Tjoa A M. The entity- relationship model for multilevel security[C]. Proceedings of the 12th International Conference on the Entity-relationship Approach: Entity-relationship Approach, Arlington, Texas, USA, Dec. 15-17, 1994: 166-177. 被引量:1
  • 4Cheng P C, Rohatgi P, and Keser C. Fuzzy multi-level security: an experiment on quantified risk-adaptive access control[C]. IEEE Symposium on Security and Privacy. Oakland, CA, May 20-23, 2007: 222-230. 被引量:1
  • 5Emilin C and Swamynathan S. Reason based access control for privacy protection in object relational database systems [J]. International Journal of Computer Theory and Engineering, 2011, 3(1): 32-37. 被引量:1
  • 6Santosh Kumar Chauhan. A study of inference control techniques [D]. [Ph.D. dissertation], National Institute of Technology Rourkela, India, 2010. 被引量:1
  • 7张明卫,刘莹,张斌,朱志良.一种基于概念的数据聚类模型[J].软件学报,2009,20(9):2387-2396. 被引量:15
  • 8史金成,胡学钢.基于二部图的概念聚类研究[J].计算机工程与应用,2010,46(13):132-134. 被引量:1
  • 9淦文燕,李德毅,王建民.一种基于数据场的层次聚类方法[J].电子学报,2006,34(2):258-262. 被引量:82
  • 10罗承忠.模糊集引论(下册)[M].北京:北京师范大学出版社,2007:178-212. 被引量:2

二级参考文献34

  • 1白硕.不完全知识下的概念聚类[J].计算机学报,1995,18(6):409-416. 被引量:6
  • 2司天歌,张尧学,戴一奇.局域网络中的L-BLP安全模型[J].电子学报,2007,35(5):1005-1008. 被引量:16
  • 3Fisher D H.Knowledge acquisition via incremental conceptual clustering[J].Machine Learning,1987,2(2):461-465. 被引量:1
  • 4Gennari J H,Langley P,Fisher D H.Models of incremental concept formation[J].Artifieial Intelligence,1989,40:11-61. 被引量:1
  • 5Dhillon I,Mallela S,Modha D.Information-theoretic Co-clnsterin[C]//Proc of the 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.Washington DC,USA:ACM Press,2003:89-98. 被引量:1
  • 6Murali T M,Kasif S.Extracting conserved gene expression motifs from gene expression data[C]//Proc of the Pacific Symposium on Biocompnting.Stanford,CA,USA:ACM Press,2003:77-88. 被引量:1
  • 7Madeira S C,Oliveira A L.Biclustering algorithms for biological data analysis:A survey[J].IEEE/ACM Transactions on Computational Biology and Bioinformatics,2004,1 (1):24-45. 被引量:1
  • 8Bell D E,LaPadula L J.Secure computer system:Unified exposition and MULTICS interpretation .Bedford,MA:The MITRE Corporation,1976. 被引量:1
  • 9Goguen J,Meseguer J.Security policies and security models .Proceedings of IEEE Symposium on Security and Privacy,1982 .Los Alamitos:IEEE Computer Society Press,1982.11-20. 被引量:1
  • 10Denning D E.A lattice model of secure information flow[J].Communication of the ACM,1976,19(5):236-243. 被引量:1

共引文献107

同被引文献61

引证文献6

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部