Article

A quantitative analysis technique for multi-classes access control model based on security entropy

  • CHE Tian-Wei ,
  • MA Jian-Feng ,
  • WANG Chao ,
  • LI Na
Expand

Received date: 2014-08-01

  Online published: 2015-03-29

Abstract

To resolve the problem of quantitative analysis on classificatory information systems, a quantitative analysis technique is proposed based on security entropy. Firstly, the security entropy is put forward according to the information theory, to calculate the uncertainty of the system's determinations on the
irregular access behaviors. Then the security theorems of classificatory information systems are defined based on security entropy. Finally, the typical access control models are analyzed by the technique, the technique's practicability is validated, and security and applicability of these models are compared. The result proves that the technique is suit for security quantitative analysis on access control model and evaluation to access control capability in information system

Cite this article

CHE Tian-Wei , MA Jian-Feng , WANG Chao , LI Na . A quantitative analysis technique for multi-classes access control model based on security entropy[J]. Journal of East China Normal University(Natural Science), 2015 , 2015(1) : 172 -177 . DOI: 10.3969/j.issn.1000-5641.2015.01.021

References

BELL D E, LAPADULA L J. Secure Computer Systems: Mathematical Foundations, M74-244 [R]. Bedford: Mass Mitre Corp, 1973: 66-79.
BELL D E. Looking back at the Bell-La Padula model [C]//21st Annual Computer Security Applications Conference. Tucson, Arizona: [s.n.], 2005: 337-351.
司天歌, 谭智勇, 戴一奇. 一种对多级安全模型安全性的分析方法~[J], 计算机研究与发展, 2008, 45(10): 1711-1717.
傅祖芸. 信息论---基础理论与应用~[M]. 北京: 电子工业出版社, 2007.
王贵宝, 黄洪钟, 张小玲.风险可能数------一种基于最大信息熵理论的风险度量和风险排序新方法~[J]. 航空学报, 2009, 30(9): 1684-1690.
付钰, 吴晓平, 叶清等. 模糊集与熵权理论的信息系统安全风险评估研究~[J]. 电子学报, 2010, 38(7): 1490-1494.
赵冬梅, 马建峰, 王跃生. 信息系统的模糊风险评估模型~[J]. 通信学报. 2007, 28(4): 51-56.
国家质量技术监督局. GB/T 17859---1999计算机信息系统安全保护等级划分准则~[S]. 北京: 中国标准出版社, 1999.
DENNING P. Third generation computer systems [J]. Computer Surveys, 1971, 3(4): 175-216.
SANDHU R S, COYNE E J, FEINSTEIN H L. Role-based access control models [J]. IEEE Computer, 1996, 29(2): 38-47.
翟征德, 徐震, 冯登国. 域间动态角色转换的静态互斥角色约束违反~[J]. 计算机研究与发展, 2008, 45(4): 677-683.
WANG C, CHEN X Y, LI N. An access control mode based on information flow graph [C]//Proceedings of the International Conference on Computational Intelligence and Security. Sanya: [s.n.], 2011: 998-1000.
Outlines

/