咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >Algorithm for sensing insider ... 收藏

Algorithm for sensing insider threat based on cloud model

作     者:Zhang, Hong-Bin Pei, Qing-Qi Ma, Jian-Feng 

作者机构:Key Laboratory of Computer Networks and Information Security of Ministry of Education Xidian University Xi'an 710071 China Institute of Information Science and Engineering Hebei University of Science and Technology Shijiazhuang 050054 China 

出 版 物:《Jisuanji Xuebao/Chinese Journal of Computers》 (Jisuanji Xuebao)

年 卷 期:2009年第32卷第4期

页      面:784-792页

核心收录:

学科分类:08[工学] 0835[工学-软件工程] 0813[工学-建筑学] 0814[工学-土木工程] 0812[工学-计算机科学与技术(可授工学、理学学位)] 

主  题:Access control 

摘      要:Using the access control relationship, the partial-order structures of subjects and objects in the system and their mapping relationship are defined, and a hierarchy-mapping based insider threat model is developed on these definitions. Then, this model is applied to build a cloud model which characterizes the states of insider threat in the system. Based on the proposed cloud model, an algorithm, which improves the accuracy and objectivity in evaluation, is also designed for sensing the insider threat in the system. Compared to the previous works, the algorithm could analyze threats of the system in various respects and makes decision qualitatively and quantitatively. As a result, the experiments show that the algorithm could effectively sense the insider threat in real-time.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分