• 综合
  • 标题
  • 关键词
  • 摘要
  • 学者
  • 期刊-刊名
  • 期刊-ISSN
  • 会议名称
搜索

作者:

Zhang, Yixuan (Zhang, Yixuan.) | He, Jingsha (He, Jingsha.) (学者:何泾沙) | Zhao, Bin (Zhao, Bin.) | Huang, Zhiqing (Huang, Zhiqing.) | Liu, Ruohong (Liu, Ruohong.)

收录:

EI Scopus SCIE

摘要:

Access control is a core security technology which has been widely used in computer systems and networks to protect sensitive information and critical resources and to counter malicious attacks. Although many access control models have been developed in the past, such as discretionary access control (DAC), mandatory access control (MAC) and role-based access control (RBAC), these models are designed primarily as a defensive measure in that they are used for examining access requests and making authorization decisions based on established access control policies. As the result, even after a malicious access is identified, the requester can still keep issuing more malicious access requests without much fear of punitive consequences from the access control system in subsequent accesses. Such access control may be acceptable in closed systems and networks but is not adequate in open systems and networks where the real identities and other critical information about requesters may not be known to the systems and networks. In this paper, we propose to design pro-active access control so that access control systems can respond to malicious access pro-actively to suit the needs of open systems and networks. We will first apply some established principles in the Game Theory to analyze current access control models to identify the limitations that make them inadequate in open systems and networks. To design pro-active access control (PAC), we incorporate a constraint mechanism that includes feedback and evaluation components and show based on the Game Theory how to make such access control respond to malicious access in a pro-active manner. We also present a framework design of PAC and demonstrate through the implementation of trust-based access control the feasibility of design, implementation and application of pro-active access control. Such kind of models and mechanisms can serve as the foundation for the design of access control systems that will be made more effective in deterring malicious attacks in open systems and networks. (C) 2014 Elsevier Ltd. All rights reserved.

关键词:

Access control Evaluation Payoffs Game theory Security Trust

作者机构:

  • [ 1 ] [Zhang, Yixuan]Beijing Univ Technol, Sch Software Engn, Beijing 100124, Peoples R China
  • [ 2 ] [He, Jingsha]Beijing Univ Technol, Sch Software Engn, Beijing 100124, Peoples R China
  • [ 3 ] [Zhao, Bin]Beijing Univ Technol, Sch Software Engn, Beijing 100124, Peoples R China
  • [ 4 ] [Huang, Zhiqing]Beijing Univ Technol, Sch Software Engn, Beijing 100124, Peoples R China
  • [ 5 ] [He, Jingsha]Beijing Dev Area Co Ltd, Gen Adm Dept, Beijing 100176, Peoples R China
  • [ 6 ] [Liu, Ruohong]Beijing Dev Area Co Ltd, Gen Adm Dept, Beijing 100176, Peoples R China

通讯作者信息:

  • 何泾沙

    [He, Jingsha]Beijing Univ Technol, Sch Software Engn, Beijing 100124, Peoples R China

查看成果更多字段

相关关键词:

相关文章:

来源 :

COMPUTERS & SECURITY

ISSN: 0167-4048

年份: 2015

卷: 49

页码: 132-146

5 . 6 0 0

JCR@2022

ESI学科: COMPUTER SCIENCE;

ESI高被引阀值:168

JCR分区:2

中科院分区:3

被引次数:

WoS核心集被引频次: 5

SCOPUS被引频次: 9

ESI高被引论文在榜: 0 展开所有

万方被引频次:

中文被引频次:

近30日浏览量: 1

在线人数/总访问数:3508/4262904
地址:北京工业大学图书馆(北京市朝阳区平乐园100号 邮编:100124) 联系我们:010-67392185
版权所有:北京工业大学图书馆 站点建设与维护:北京爱琴海乐之技术有限公司