• 中国计算机学会会刊
  • 中国科技核心期刊
  • 中文核心期刊

J4 ›› 2013, Vol. 35 ›› Issue (5): 46-50.

• 论文 • 上一篇    下一篇

基于用户行为的可信模型研究

欧嵬1,王勇军1,韩文报2   

  1. (1.国防科学技术大学计算机学院,湖南 长沙 410073;2.信息工程大学信息工程学院,河南 郑州 450002)
  • 收稿日期:2011-02-22 修回日期:2011-06-07 出版日期:2013-05-25 发布日期:2013-05-25
  • 基金资助:

    国家863计划资助项目(2009AA01A346)

Research on trustworthy model based on user behavior  

OU Wei1,WANG Yongjun1,HAN Wenbao2   

  1. (1.School of Computer Science,National University of Defense Technology,Changsha 410073;
    2.Institute of Information Engineering,Information Engineering University,Zhengzhou 450002,China)
  • Received:2011-02-22 Revised:2011-06-07 Online:2013-05-25 Published:2013-05-25

摘要:

传统的授权与认证主要解决了用户的身份信任问题,但并没有解决用户行为的信任问题。基于此,从解决系统安全需求的角度出发,提出了一种基于用户行为的可信模型。该模型将网络服务的用户看作主体,计算机系统中的文件和数据看作客体,对不同的主体和客体分别赋予不同的机密性级别和完整性级别;同时,将用户对系统的服务请求映射为主体对客体的访问,通过定义模型的安全属性、安全策略以及用于约束用户行为的规则,构造了一个安全、可信的系统。
关键词:用户行为;信任;安全属性;安全策略;规则

关键词: 用户行为;信任;安全属性;安全策略;规则

Abstract:

Traditional authorization and authentication solves the problem of trust of user identify, but not solves the problem of trust of user behavior. Therefore, the paper proposed a new trustworthy model based on user behavior so as to meet the needs of security systems. In this model, users of network service are regarded as subjects, and files and data in computer are regarded as objects. Different subjects and objects are assigned to different levels of confidentiality and integrity. A user' service request on system is mapped into the access from a subject to an object. In this model, security attributes and security strategies and rules used to restrict users' behavior are all defined. Hence, a security and trustworthy computer system is made up.

Key words: user behavior;trust;security attribute;security strategy;rule