浏览全部资源
扫码关注微信
1. 河北大学网络空间安全与计算机学院,河北 保定 071002
2. 河北省高可信信息系统重点实验室,河北 保定 071002
[ "梁晓艳(1981− ),女,河北衡水人,博士,河北大学讲师,主要研究方向为网络信息安全、网络防御规则语义分析等" ]
[ "杜瑞忠(1975− ),男,河北献县人,博士,河北大学教授、博士生导师,主要研究方向为可信计算、信息安全等" ]
网络出版日期:2021-09,
纸质出版日期:2021-09-25
移动端阅览
梁晓艳, 杜瑞忠. IoT下CapBAC规则语义表示及其时间间隔粗糙性分析[J]. 通信学报, 2021,42(9):43-53.
Xiaoyan LIANG, Ruizhong DU. Semantic representation and interval roughness analysis of IoT CapBAC rules[J]. Journal on communications, 2021, 42(9): 43-53.
梁晓艳, 杜瑞忠. IoT下CapBAC规则语义表示及其时间间隔粗糙性分析[J]. 通信学报, 2021,42(9):43-53. DOI: 10.11959/j.issn.1000-436x.2021075.
Xiaoyan LIANG, Ruizhong DU. Semantic representation and interval roughness analysis of IoT CapBAC rules[J]. Journal on communications, 2021, 42(9): 43-53. DOI: 10.11959/j.issn.1000-436x.2021075.
为突破IoT CapBAC规则时间间隔粗糙性分析瓶颈,提出了规则语义表示模型IoTACS以及粗糙性分析算法IoTRA。在IoTACS中,提出IoT CapBAC规则领域的概念结构、基本概念的定量数据属性表示以及规则语义树模型;扩展Time本体的时间关系,给出其定量逻辑表示。作为IoTRA算法的理论基础,证明了粗糙性是造成不一致的根本原因,给出其逻辑表示。案例研究表明,IoTRA 算法有助于提升授权时间的准确性,IoTACS 模型比形式化语义模型具有更高的可读性;仿真实验表明,与IoTC
2
算法相比,IoTRA算法响应时间显著减少。
To break the bottleneck of interval roughness analysis
a rule semantic model IoTACS was proposed
and IoTRA algorithm was given.In IoTACS
a conceptual structure of the IoT CapBAC rule domain was proposed
the quantitative data properties of the basic concepts were given
then the semantic tree model of rule semantics was proposed
the time relations of the time ontology were extended and its quantitative logical representation was given.As the theoretical basis
it was proved that the root cause of interval inconsistency was roughness
and its logical formalization of the roughness was given.The case study shows that IoTRA can help to improve the accuracy of the authorized interval
and the IoTACS model have higher readability than the formal model.The comparison experiments with the IoTC
2
algorithm on the inconsistency analysis show that the response time of the IoTRA algorithm is more significantly reduced.
Ericsson . Erisson mobility report [R ] . 2021 .
周悦芝 , 张迪 . 近端云计算:后云计算时代的机遇与挑战 [J ] . 计算机学报 , 2019 , 42 ( 4 ): 677 - 700 .
ZHOU Y Z , ZHANG D . Near-end cloud computing:opportunities and challenges in the post-cloud computing era [J ] . Chinese Journal of Computers , 2019 , 42 ( 4 ): 677 - 700 .
邱宇 , 王持 , 齐开悦 , 等 . 智慧健康研究综述:从云端到边缘的系统 [J ] . 计算机研究与发展 , 2020 , 57 ( 1 ): 53 - 73 .
QIU Y , WANG C , QI K Y , et al . A survey of smart health:system de-sign from the cloud to the edge [J ] . Journal of Computer Research and Development , 2020 , 57 ( 1 ): 53 - 73 .
THAKARE A , LEE E , KUMAR A , et al . PARBAC:priority-attribute-based RBAC model for azure IoT cloud [J ] . IEEE Internet of Things Journal , 2020 , 7 ( 4 ): 2890 - 2900 .
杜瑞忠 , 刘妍 , 田俊峰 . 物联网中基于智能合约的访问控制方法 [J ] . 计算机研究与发展 , 2019 , 56 ( 10 ): 2287 - 2298 .
DU R Z , LIU Y , TIAN J F . An access control method using smart con-tract for Internet of Things [J ] . Journal of Computer Research and De-velopment , 2019 , 56 ( 10 ): 2287 - 2298 .
NAKAMURA Y , ZHANG Y , SASABE M , et al . Exploiting smart contracts for capability-based access control in the Internet of Things [J ] . Sensors , 2020 , 20 ( 6 ): 1793 .
NAKAMURA Y , ZHANG Y , SASABE M , et al . Capability-based access control for the Internet of things:an Ethereum blockchain-based scheme [C ] // 2019 IEEE Global Communications Conference . Piscataway:IEEE Press , 2019 : 1 - 6 .
TAPAS N , LONGO F , MERLINO G , et al . Experimenting with smart contracts for access control and delegation in IoT [J ] . Future Generation Computer Systems , 2020 , 111 : 324 - 338 .
张玉清 , 周威 , 彭安妮 . 物联网安全综述 [J ] . 计算机研究与发展 , 2017 , 54 ( 10 ): 2130 - 2143 .
ZHANG Y Q , ZHOU W , PENG A N . Survey of Internet of things se-curity [J ] . Journal of Computer Research and Development , 2017 , 54 ( 10 ): 2130 - 2143 .
FAROOQ A , Al-SHARE E , MOYER T . IoTC 2: a formal method approach for detecting conflicts in large scale IoT systems [C ] // 2019 IFIP/IEEE Symposium on Integrated Network and Service Management . Piscataway:IEEE Press , 2019 : 442 - 447 .
W3C . Time ontology in OWL [R ] . 2020 .
GUSMEROLI S , PICCIONE S , ROTONDI D . IoT@Work automation middleware system design and architecture [C ] // Proceedings of 2012 IEEE 17th International Conference on Emerging Technologies &Factory Automation . Piscataway:IEEE Press , 2012 : 1 - 8 .
NAKAMURA S , ENOKIDO T , TAKIZAWA M . Time-based legality of information flow in the capability-based access control model for the Internet of Things [J ] . Concurrency and Computation:Practice and Experience , 2020 :e5944.
NAKAMURA S , ENOKIDO T , TAKIZAWA M . Information flow control based on the CapBAC (capability-based access control) model in the IoT [J ] . International Journal of Mobile Computing and Multimedia Communications , 2019 , 10 ( 4 ): 13 - 25 .
VANNUCCHI C , DIAMANTI M , MAZZANTE G , et al . Symbolic verification of event-condition-action rules in intelligent environments [J ] . Journal of Reliable Intelligent Environments , 2017 , 3 ( 2 ): 117 - 130 .
SCHERP A , FRANZ T , SAATHOFF C . F——a model of events based on the foundational ontology dolce+DNS ultralight [C ] // Proceedings of the Fifth International Conference on Knowledge Capture . Piscataway:IEEE Press , 2009 : 137 - 144 .
RODRIGUES M , ROCHA SILVA R , BERNARDINO J . Linking open descriptions of social events (LODSE):a new ontology for social event classification [J ] . Information , 2018 , 9 ( 7 ): 164 .
LI F , DU J C , HE Y Q , et al . Time event ontology (TEO):to support semantic representation and reasoning of complex temporal relations of clinical events [J ] . Journal of the American Medical Informatics Association , 2020 , 27 ( 7 ): 1046 - 1056 .
ERMOLAYEV V , BATSAKIS S , KEVERLE N . Ontologies of time:review and trends [J ] . International Journal of Computer Science &Applications , 2014 , 11 ( 3 ): 57 - 115 .
SIKOS L F . OWL ontologies in cybersecurity:conceptual modeling of cyber-knowledge [M ] . Berlin : Springer , 2019 .
BAUMANN R , LOEBE F , HERRE H . Axiomatic theories of the ontology of time in GFO [J ] . Applied Ontology , 2014 , 9 ( 3 ): 171 - 215 .
ELMALLAH E S , GOUDA M G . Hardness of firewall analysis [J ] . IEEE Transactions on Dependable and Secure Computing , 2017 , 14 ( 3 ): 339 - 349 .
ZAMANIAN M , HEYDARI P . Readability of texts:state of the art [J ] . Theory and Practice in Language Studies , 2012 , 2 ( 1 ): 43 - 53 .
VORONKOV A , IWAYA L H , MARTUCCI L A , et al . Systematic literature review on usability of firewall configuration [J ] . ACM Computing Surveys , 2018 , 50 ( 6 ): 1 - 35 .
0
浏览量
397
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构