首页 | 本学科首页   官方微博 | 高级检索  
     

利用访问向量的内部威胁感知方法
引用本文:张红斌,裴庆祺,王超,王美华. 利用访问向量的内部威胁感知方法[J]. 西安电子科技大学学报(自然科学版), 2014, 41(1): 110-115. DOI: 10.3969/j.issn.1001-2400.2014.01.020
作者姓名:张红斌  裴庆祺  王超  王美华
摘    要:

收稿时间:2012-11-07

Sensing insider threat based on access vectors
ZHANG Hongbin,PEI Qingqi,WANG Chao,WANG Meihua. Sensing insider threat based on access vectors[J]. Journal of Xidian University, 2014, 41(1): 110-115. DOI: 10.3969/j.issn.1001-2400.2014.01.020
Authors:ZHANG Hongbin  PEI Qingqi  WANG Chao  WANG Meihua
Affiliation:(1. Institute of Information Science & Engineering, Hebei Univ. of Science and Technology, Shijiazhuang  050018,China;2. State Key Lab. of Integrated Service Networks, Xidian Univ., Xi'an  710071,China)
Abstract:The hierarchy-based access control model and access vectors are defined by using the access control relationship. A method is developed for quantizing the insider threat on resources and actions in the information system. Then a full real time assessment is obtained by using access vectors. Compared with other models, this model improves the precision and objectivity of the quantization without a prior knowledge of the system. Experimental results show that the access vector based on the hand hierarchy-based access control model can effectively assess the insider threat in real-time and can be used to build the insider threat sense system.
Keywords:insider threat   assessment   access control   vector  
本文献已被 CNKI 等数据库收录!
点击此处可从《西安电子科技大学学报(自然科学版)》浏览原始摘要信息
点击此处可从《西安电子科技大学学报(自然科学版)》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号