期刊文献+

基于条件随机场的改进型BLP访问控制模型 被引量:5

Improved BLP Model Based on CRFs
下载PDF
导出
摘要 针对大多访问控制模型缺乏对系统安全状态和风险的动态感知能力这一问题,通过将基于条件随机场的机器学习方法引入BLP模型的规则优化中,提出一种动态BLP模型——CRFs-BLP。该模型首先通过对历史访问日志进行预处理与标注,来提取特征值。然后用CRF++工具包对其学习和训练,使模型规则能够根据当前系统的安全状态及安全事件进行动态调整,还可以动态地限制敏感客体的读写范围。最后,通过实验表明了模型在实际环境中的有效性和准确性。 As most access control models are short of the ability to perceive the system security status and risks in a dy- namic way, the paper introduced a machine learning method CRFs into the rule optimization of BLP model, and proposed a dynamic BLP model, CRFs-BLP. After preprocessing and tagging the history access log, it will extract the feature set, then CRF++ toolkit will be taken to finish the study and training of these datasets, so the model can be adjusted dynamically according to the current secure state and events in system,and the read-write scope for sensitive objects will be limited dynamically. Finally, the experiment shows the availability and accuracy of the model in a real environment.
出处 《计算机科学》 CSCD 北大核心 2015年第8期138-144,151,共8页 Computer Science
基金 国家自然基金项目(61103047) 863计划(2012AA01A301-01) 武汉大学软件工程国家重点实验室开放基金(SKLSE2012-09-18)资助
关键词 访问控制 条件随机场 机器学习 BLP模型 Access control, CRFs, Machine learning, BLP model
  • 相关文献

参考文献21

  • 1Sandhu R S, Samarati P. Access control: principle and practice [J]. Communications Magazine, IEEE, 1994,32 (9) 40-48. 被引量:1
  • 2Yang Kan, Jia X H. Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage [J]. IEEE Transactions on Parallel and Distributed Systems, 2014,25 (7) ; 1735-1744. 被引量:1
  • 3Lan Zhou, Varadharajan V, Hitchens M. Achieving Secure Role- Based Access Control on Encrypted Data in Cloud Storage[J]. IEEE Transactions on Information Forensics and Security, 2013,8(12) : 1947-1960. 被引量:1
  • 4Bell D E, LaPadula L J. Secure Computer Systems: Mathematical Foundations: ESD-TR-73-278, I (AD) 770768[R]. Bedford, UK.. MITRE Corporation, 1973. 被引量:1
  • 5Bell D E, LaPadula L J. Secure Computer System: A Mathemati- cal Model [R]. Bedford, MA: Electronic Systems Division, Air Force System Command, Hanscom AFB, 1973. 被引量:1
  • 6Shen Ying,Xiong L R. Lattic based BLP extended model [C// Proc of the 2nd International Conference on Future Information Technology and Management Engineering. 2009:309-312. 被引量:1
  • 7梁洪亮,孙玉芳,赵庆松,张相锋,孙波.一个安全标记公共框架的设计与实现[J].软件学报,2003,14(3):547-552. 被引量:16
  • 8蔡谊,郑志蓉,沈昌祥.基于多级安全策略的二维标识模型[J].计算机学报,2004,27(5):619-624. 被引量:28
  • 9刘彦明,董庆宽,李小平.BLP模型的完整性增强研究[J].通信学报,2010,31(2):100-106. 被引量:17
  • 10Lee T M P. Using mandatory integrity to enforce "commercial" security[C]//Proc of IEEE Conference on Security and Privacy. Washington DC: IEEE Computer Society, 1998:140-146. 被引量:1

二级参考文献102

共引文献260

同被引文献51

引证文献5

二级引证文献26

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部