Bayes decision theory based risk minimization authorization mapping
Academic paper|更新时间:2024-06-05
|
Bayes decision theory based risk minimization authorization mapping
Journal on CommunicationsVol. 36, Issue Z1, Pages: 157-161(2015)
作者机构:
1. 北京工业大学 软件学院,北京 100124
2. 济宁学院 计算机科学系,山东 曲阜 273155
作者简介:
基金信息:
The National High Technology Research and Development Program of China (863 Program)(2015AA017204);The National Natural Science Foundation of China(61272500);The Natural Science Foundation of Shandong Province(ZR2013FQ024);The Natural Science Foundation of Beijing(4142008);The Opening Project of State Key Laboratory of Digital Publishing Technology
Bin ZHAO, Jing-sha HE. Bayes decision theory based risk minimization authorization mapping[J]. Journal on Communications, 2015, 36(Z1): 157-161.
DOI:
Bin ZHAO, Jing-sha HE. Bayes decision theory based risk minimization authorization mapping[J]. Journal on Communications, 2015, 36(Z1): 157-161. DOI: 10.11959/j.issn.1000-436x.2015295.
Bayes decision theory based risk minimization authorization mapping
Authorization decision was one of the key issues in the control access.In order to effectively enhance the security of authorization in trust based access control authorization
according to minimization risk Bayes decision theory
authorization was the object to the subject in access control as found that the problem of optimal decision.A method that minimizates risk based authorization mapping to realize correct authorization operation in the access control was proposed.Example analysis and simulation experiment show that the method is able to reduce risk accurately to interaction final authorization.
GLYNOS D , ARGYROUDIS P , DOULIGERIS C . Collaborative service evaluation with the two hop trust framework [J ] . Security and Communication Networks , 2012 , 5 ( 6 ): 594 - 613 .
HAN G , JIANG J , SHU L , et al . Management and applications of trust in wireless sensor networks:a survey [J ] . Journal of Computer and System Sciences , 2014 , 80 ( 3 ): 602 - 617 .
WANG T , CHEN X Y , ZHANG B , et al . Research of resource management in authorization and access control technology [J ] . Journal of Chinese Computer Systems , 2011 , 32 ( 4 ): 619 - 625 .
ZHAO B , HE J S . Dynamic global trust evaluation based on balance weight [J ] . Journal of Beijing University of Posts and Telecommunications , 2015 , 38 ( 2 ): 113 - 117 .
MASOOD R , SHIBLI M A , GHAZI Y , et al . Cloud authorization:exploring techniques and approach towards effective access control framework [J ] . Frontiers of Computer Science , 2015 , 9 ( 2 ): 297 - 321 .
LU J , JOSHI J B D , JIN L , et al . Towards complexity analysis of user authorization query problem in RBAC [J ] . Computers & Security , 2015 ,( 48 ): 116 - 130 .
SONG L K , CUI D G , ZHOU R R . Mapping technology between enterprise model and ERP system [J ] . Acta Aeronauticaet Astronau Tica Sinica , 2007 , 28 ( 6 ): 1513 - 1520 .
BAO Y P , ZHANG W M , YAO L . Model for processing recommendatory trust information based on ontology mapping [J ] . Computer Science , 2009 , 36 ( 6 ): 185 - 187,195 .
WAN M , LIU Y , ZHANG H K . New mapping approach based on reputation model under locator/ID separation protocol [J ] . Journal on Communications , 2011 , 32 ( 7 ): 133 - 145 .
QING S D , LIAO J X , ZHU X M , et al . Virtual network embedding algorithms in the network virtualization environment [J ] . Journal of Software , 2012 , 23 ( 11 ): 3045 - 3058 .
BERGER J O . Statistical Decision Theory and Bayesian Analysis [M ] . Springer Science & Business Media , 2013 .