首页 | 本学科首页   官方微博 | 高级检索  
     

基于主客体安全性评估的访问控制模型
引用本文:罗俊,刘嘉勇,龚勋,胡勇. 基于主客体安全性评估的访问控制模型[J]. 四川大学学报(工程科学版), 2011, 43(6): 140-147
作者姓名:罗俊  刘嘉勇  龚勋  胡勇
作者单位:1. 四川大学信息安全研究所,四川成都,610041
2. 四川大学计算机学院,四川成都,610065
基金项目:中国信息安全测评中心资助项目
摘    要:从访问行为的主体和客体安全性出发,提出了一种基于主客体安全性评估的访问控制模型。定义了用户安全度、资源安全度、用户安全级别、资源安全级别和操作级别等概念及其相互关系,提出了用户以某种操作访问某系统资源需要满足的条件公式。通过威胁、脆弱性和环境安全性估值的加权求和得到用户所访问客体所在设备的安全性估值,即为客体安全度。访问行为的主体安全度则取决于用户所用物理设备的安全性、用户对资源使用的合规性、用户的历史表现、第三方对用户的评价以及用户身份凭证级别。讨论了这5个因素估值的计算方法,并采用加权和求得主体安全度。最后,在实际应用中对该访问控制模型进行了实验验证。统计数据表明,与基于防火墙和入侵检测的访问控制系统相比,采用基于主客体安全性评估的访问控制系统的安全事件无论从总数还是严重性上都有明显下降。

关 键 词:访问控制  主体  客体  安全度  安全级别
收稿时间:2011-07-09
修稿时间:2011-09-21

Access Control Model Based on the Security Evaluation of Subject and Object
Luo Jun,Liu Jiayong,Gong Xun and Hu Yong. Access Control Model Based on the Security Evaluation of Subject and Object[J]. Journal of Sichuan University (Engineering Science Edition), 2011, 43(6): 140-147
Authors:Luo Jun  Liu Jiayong  Gong Xun  Hu Yong
Affiliation:Sichuan University.,Inst.of Info.Security,Sichuan Univ.,College of Computer Science, Sichuan University,Inst.of Info.Security,Sichuan Univ.
Abstract:An access control model based on the security evaluation of subject and object is proposed in this paper. At first, some important concepts and their relationships, such as user (subject) security degree, resource (object) security degree, user security level, resource security level, and operation level were defined. Then a formula to qualify the condition that the user must satisfy when he accessed a certain system resource by a certain operation was provided from the angle of security. In the paper, the object security degree was decided by the security evaluation value of the device that the accessed resource lied in, which equaled the weighting sum of the evaluation values of the threat, the vulnerability and the environment security. The user security degree was decided by five factors as follows: the security of physical device used by the user, compliance of the use of the resources, the history behavior of the user, the evaluation of the user by a third party, and the identity certificate class. The methods to compute the values of these five factors were discussed and the subject security degree is equal to the weighting sum. At last, the proposed access control model based on the security evaluation of subject and object is verified in practical application. The statistics of experiment showed, compared with the access control system depended on firewall and IDS, the total number and severity of security events of the system based on the proposed access control model decreased obviously.
Keywords:access control   subject   object   security degree   security level
本文献已被 CNKI 万方数据 等数据库收录!
点击此处可从《四川大学学报(工程科学版)》浏览原始摘要信息
点击此处可从《四川大学学报(工程科学版)》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号