:::

詳目顯示

回上一頁
題名:基於情境感知之網路服務環境的高安全存取控制機制
書刊名:資訊管理學報
作者:曹偉駿鄭博元李建邦 引用關係
作者(外文):Tsaur, Woei-jiunnCheng, Bo-yuanLee, Chien-pang
出版日期:2013
卷期:20:2
頁次:頁167-192
主題關鍵詞:網路服務角色為基礎的存取控制資訊安全情境感知決策樹Web servicesRBACInformation securityContext-awareDecision tree
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(1) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:1
  • 共同引用共同引用:0
  • 點閱點閱:41
以角色為基礎的存取控制(Role-based Access Control; RBAC)方式應用於網路服務中,雖然可使管理者有效率地檢視使用者目前所擁有的權限,然而隨著網路的發展與普及,網路安全問題層出不窮,現有存取控制機制是不足以確保網路服務的安全性。因此,本研究除了以情境感知機制彌補RBAC的不足,更進一步使用決策樹演算法探勘隱藏情境。其中,情境感知技術能隨著不同的時空與環境狀態變化,動態地調整用戶存取限制,並依照通訊裝置的特色,提供適當的服務與存取內容,使得授權機制更為彈性,故系統不論在安全性或執行效率上,皆能夠獲得較佳的改善。本機制首先整合單一登入與跨網域RBAC,改善多系統權限不一與角色衝突的問題,並藉由情境感知技術達到彈性授權之目的,更進一步地採用決策樹演算法,使得情境的推論更加精準,以提升系統在資訊傳輸的安全性及執行效率。
With the more and more serious networks security problems, the existing role-based access control (RBAC) mechanisms are insufficient. Therefore, our research will improve RBAC mechanism by adding the functionality of context-aware, and further analyze hidden context data using the decision tree algorithm. The context-aware technique can dynamically adjust users' access constraints with differently temporal, spatial and environmental factors, and at the same time provide adaptable access contents according to distinctive features of equipment (or devices), such that it can extremely enhance security and efficiency in the information systems. Our proposed scheme will integrate the single sign-on and cross-domain RBAC mechanism to solve inconsistent authority and role conflict problems among multi-system in web services, and further achieve the capability of flexible authorization by using context-aware technique. Moreover, in order to improve the system security and efficiency for information transmissions of web services, we further employ the decision tree algorithm to enhance the precision of context inference.
期刊論文
1.Abdallah, A. E.、Takabi, H.(2010)。Formalizing delegation and integrating it into role-based access control models。Journal of Information Assurance and Security,5(1),21-30。  new window
2.Al, A. D.、McNair, J.(2008)。On the interaction between localization and location verification for wireless sensor networks。Computer Networks,52(14),2713-2727。  new window
3.Chang, C. C.、Lou, D. C.、Wu, T. C.(1997)。A binary access control method using prime factorization。Information Sciences,96(1),15-26。  new window
4.Ferraiolo, D.、Barkley, F.、Kuhn, R.(1999)。A role based access control model and reference implementation within a corporate intranet。ACM Transactions on Information and System Security,2(1),34-64。  new window
5.Han, S. C.、Xia, Y.(2009)。Optimal node-selection algorithm for parallel download in overlay content-distribution networks。Computer Networks,53(9),1480-1496。  new window
6.Kapsalis, Vassilis、Hadellis, Loukas、Karelis, Dimitris、Koubias, Stavros(2006)。A dynamic context-aware access control architecture for e-services。Computers & Security,25(7),507-521。  new window
7.Mengelberg, J. B.(2005)。Teaching system access control。Journal of Issues in Informing Science and Information Technology,2,139-158。  new window
8.Palomar, E.、Tapiador, J. M. E.、Hernández-Castro, J. C.、Ribagorda, A.(2008)。Secure content access and replication in pure P2P networks。Computer Communications,31(2),266-279。  new window
9.Polat, K.、Gunes, S.(2009)。A novel hybrid intelligent method based on c4.5 decision tree classifier and one-against-all approach for multi-class classification problems。Expert Systems with Applications,36(3),1587-1592。  new window
10.Sheu, J. P.、Tu, S. C.、Hsu, C. H.(2008)。Location-free topology control protocol in wireless ad hoc networks。Computer Communications,31(14),3410-3419。  new window
11.Androutsellis-Theotokis, S.、Spinellis, D. A.(2004)。A survey of peer-to-peer content distribution technologies。ACM Computing Surveys,36(4),335-371。  new window
12.Strembeck, M.、Neumann, G.(2004)。An integrated approach to engineer and enforce context constraints in RBAC environments。ACM Transactions on Information and System Security,7(3),392-427。  new window
13.Tomur, E.、Erten, Y. M.(2006)。Application of temporal and spatial role based access control in 802.11 wireless networks。Computers & Security,25(6),452-458。  new window
14.Younas, M.、Awan, I.、Duce, D.(2006)。An efficient composition of web services with active network support。Expert Systems with Applications,31(4),859-869。  new window
15.Yuan, Y.、Shaw, M. J.(1995)。Induction of fuzzy decision trees。Fuzzy Sets and Systems,69(2),125-139。  new window
16.Lim, B. B. L.、Sun, Y.、Vila, J.(2004)。Incorporating WS-Security into a web services-based portal。Information Management & Computer Security,12(3),206-217。  new window
17.Quinlan, J. R.(1987)。Simplifying decision trees。International Journal of Man-Machine Studies,27(3),221-234。  new window
會議論文
1.Ferraiolo, D.、Kuhn, R.(1992)。Role-based access controls。Fifteenth National Computer Security Conference。Baltimore。554-563。  new window
2.Gu, Y.、Guo, W.(2010)。Decision tree method in financial analysis of listed logistics companies。2010 International Conference on Intelligent Computation Technology and Automation,(會議日期: 20100511-20100512)。Changsha, China。1101-1106。  new window
3.Maniatis, P.、Giuli, T.、Roussopoulos, M.、Rosenthal, D. S. H.、Baker, M.(2004)。Impeding attrition attacks in P2P systems。11th ACM SIGOPS European Workshop,(會議日期: 20040919-20040922)。Leuven, Belgium。1-5。  new window
4.Mundt, T.(20061002)。Two methods of authenticated positioning。Second ACM International Workshop on Quality of Service & Security for Wireless and Mobile Networks。New York, USA。25-32。  new window
5.Park, J. S.、Hwang, J.(2003)。Role-based access control for collaborative enterprise in peer-to-peer computing environments。Eighth ACM Symposium on Access Control Models and Technologies,(會議日期: 20030602-20030603)。New York, USA。93-99。  new window
6.Tsaur, W. J.、Lin, Y. M.(2009)。An agent-based single sign-on scheme for web services environments。International Conference on Security and Management,(會議日期: 20090713-20090716)。Las Vegas Nevada, USA。220-226。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
QR Code
QRCODE