Author Login Editor-in-Chief Peer Review Editor Work Office Work

Computer Engineering ›› 2013, Vol. 39 ›› Issue (8): 173-176. doi: 10.3969/j.issn.1000-3428.2013.08.037

• Networks and Communications • Previous Articles     Next Articles

A Conspire-accesses Risk Control Model Based on Information Flow Graph

WANG Chao 1a,2, CHEN Xing-yuan 1b   

  1. (1a. The 4th Institute; 1b. The 3rd Institute, PLA Information Engineering University, Zhengzhou 450004, China; 2. State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450004, China)
  • Received:2012-02-10 Online:2013-08-15 Published:2013-08-13

一种基于信息流图的共谋访问风险控制模型

王 超1a,2,陈性元1b   

  1. (1. 解放军信息工程大学 a. 四院;b. 三院,郑州 450004;2. 数学工程与先进计算国家重点实验室,郑州 450004)
  • 作者简介:王 超(1975-),男,讲师,主研方向:信息安全;陈性元,教授、博士生导师
  • 基金资助:
    国家“973”计划基金资助项目(2011CB311801);河南省科技创新人才计划基金资助项目(114200510001)

Abstract: To solve the problem of nonlicet indirectly access in the information system, this paper proposes a conspire-accesses risk control model based on information flow graph. It forms an information flow graph through recording history accesses, and defines the conspire-accesses. It defines the access control model based on states machine, to prevent the conspire-accesses by security theorems and rules, and proves the security of the rules. It analyses and verifies the model’s validity based on information entropy theory, and the result proves that the model can prevent conspire-accesses.

Key words: information flow, information flow graph, conspire-accesses, risk control model, access control model, security entropy

摘要: 为解决信息系统中的非授权间接访问问题,提出一种基于信息流图的共谋访问风险控制模型。通过记录系统的历史访问行为构建信息流图,在此基础上定义共谋访问行为,同时基于状态机定义访问控制模型,利用安全性定理和规则防止共谋访问的发生,并对规则做安全性证明。根据信息熵理论对模型的有效性进行分析和验证,结果证明该模型可有效防止共谋访问的发生。

关键词: 信息流, 信息流图, 共谋访问, 风险控制模型, 访问控制模型, 安全熵

CLC Number: