CN108924120A - A kind of dynamic accesses control method of multi-dimensional state perception - Google Patents

A kind of dynamic accesses control method of multi-dimensional state perception Download PDF

Info

Publication number
CN108924120A
CN108924120A CN201810686982.2A CN201810686982A CN108924120A CN 108924120 A CN108924120 A CN 108924120A CN 201810686982 A CN201810686982 A CN 201810686982A CN 108924120 A CN108924120 A CN 108924120A
Authority
CN
China
Prior art keywords
access request
req
request
current
coefficient
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810686982.2A
Other languages
Chinese (zh)
Other versions
CN108924120B (en
Inventor
陈爱国
罗光春
田玲
惠孛
邢瀚文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Electronic Science and Technology of China
Original Assignee
University of Electronic Science and Technology of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Electronic Science and Technology of China filed Critical University of Electronic Science and Technology of China
Priority to CN201810686982.2A priority Critical patent/CN108924120B/en
Publication of CN108924120A publication Critical patent/CN108924120A/en
Application granted granted Critical
Publication of CN108924120B publication Critical patent/CN108924120B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention proposes a kind of dynamic accesses control method of multi-dimensional state perception, can identify the state of user itself, the other unknown multi-dimensional states of user can be also identified, to reach more accurate access control.The method mainly includes the following steps that:Step 1:Obtain the association attributes of user request information;Step 2:Computation requests main body oneself state;Step 3:Know that user requests other states by influenza;Step 4:Comprehensive oneself state result and stream sensing results;Step 5:It is made a policy according to comprehensive evaluation result;Step 6:Decision adjusts the threshold value that overall merit module risk occupies after practical application is fed back;The attributes such as main body, object and context environmental are considered as data flow by the present invention, by the abnormality detection of the data flow to history window, evaluate the value-at-risk of current accessed.This method can realize dynamic access control under dynamic cloud ring mirror, thus the safety of the vast resources under protecting cloud computing environment.

Description

A kind of dynamic accesses control method of multi-dimensional state perception
Technical field
The present invention relates to the dynamic accesses control methods that field of cloud computer technology more particularly to a kind of multi-dimensional state perceive.
Background technique
In cloud computing environment, various resources are dynamically connected on internet, since internet is one open Network environment inevitably interacts between node, is related to safety problem, therefore convenient enjoying cloud computing bring While, also to consider its safety, access control technology is safety method most basic in cloud computing environment, each for protecting Kind resource is used by the user of unrecognizable system and unauthorized.However the resource in cloud computing environment it is not only huge and And there is dynamic, in cloud computing environment demand for security also with the different from of traditional computer.CloudIt calculatesIt is dangerous in environment Property mainly consists of two parts:A part is uncontrollable from outside, caused by uniqueness of the another part from cloud computing environment Inside it is uncontrollable.The access control in cloud computing environment is mostly from the angle of risk at this stage, the access control based on risk Simulation is to solve the mode that insecurity factor is best in dynamic environment.Meanwhile it is this kind of dynamic, distributed in cloud computing environment System in, necessary not only for concern user role, it is also necessary to relevant attribute is paid close attention to, because beam-based alignment can To provide the security means of dynamic, context-aware, beam-based alignment can well adapt to cloud computing environment. The mode that risk and attribute combine can be provided to better safe thinking for access control, thus herein just be based on attribute with On access control model based on risk, how research utilizes the context state of user in access control technology, provides one A cloud computing environment perceives dynamic access control system.
It is relevant research shows that risk assessment be solve object environment in randomness bring safety factor effective way. However, about the research of risk access control and few in cloud computing environment.For risk trust model, there is correlative study person The access control model based on risk assessment is proposed, in their model, there are three modules:Access control module, Risk assessment module and context module.Some scholars propose risk trusted right delegation mechanism to evaluate the voucher of user, with dynamic State adjusts access authority, and the detailed effect for discussing risk and trust of author in the text is descendant on risk faith mechanism Research lay a good foundation.However in the access control model of these risk assessment, risk assessment module is substantially still adopted With static risk policy, this mode requires safety officer not only to need to configure traditional rule and policy and is also required to configuration wind Dangerous rule and policy, although also having aggravated the burden of safety manager enhancing the safety of access control to a certain degree.
Therefore the present invention proposes a kind of new dynamic accesses control method, and this method passes through for requesting at the analysis flowed Reason, to provide a kind of multi-dimensional state perception dynamic accesses control method based on context environmental perception.
Summary of the invention
A kind of dynamic accesses control method of multi-dimensional state perception proposed in this paper, this method are different from traditional access control The information that user requests stream is utilized in technology processed in the access control decision to user, passes through the current of analysis user's request State, and Multidimensional Awareness is carried out to current request by stream, so that the analysis of current state progress multidimensional is requested user, with Carry out decision to the authentication result of current request, specific step is as follows:
Step 1:When a user submits access request, this method handle main body relevant to access request is believed substantially Breath and subjective environment information are as input.Main body essential information refers to essential attribute information relevant to request, subjective environment letter Breath is some variables with request body environmental correclation, includes the fragility, menace and integrality of environment.
Step 2:The objective security coefficient of current request main body is calculated, objective security coefficient includes main body essential information safety Coefficient and subjective environment information security coefficient.
Step 3:Access request is subjected to decision, evaluation of the computation requests history stream to current request in stream process engine Coefficient, the evaluation coefficient obtain the evaluation of estimate of itself by the impact factor and historical data stream for calculating similar record.It goes through History data flow is the drift exponent of history stream itself to the evaluation of estimate of itself, and drift exponent refers to the credible of historical requests point itself Degree, because the confidence level of historical requests point can be varied with the variation of time and other environmental factors.
Step 4:In conjunction with current request main body objective security coefficient and historical requests stream to the evaluation coefficient of current request, Final comprehensive evaluation result is calculated.
Step 5:Decision engine determines final decision according to the comparison of comprehensive evaluation result and default access thresholds:If Comprehensive evaluation result is greater than or equal to default access thresholds, then allows current access request;Otherwise, refuse current access request.
Further, the dynamic accesses control method of multi-dimensional state of the invention perception further includes:
Step 6:After practical application a certain period of time, the actual feedback of dynamic accesses control method is obtained, it will This value of feedback be used to adjust comprehensive evaluation result, achieve the effect that by practical application come feedback adjustment comprehensive evaluation result, Improve the purpose of access control method accuracy.
In conclusion a kind of dynamic accesses control method of multi-dimensional state perception provided by the invention, effectively improves Access performance:One there is provided a kind of completely dynamic access control technology, which no longer restrains the formulation of static rule;Two It is the historical data that user is effectively utilized, gives the method that current request is authenticated by historical data;Third is that meter The validity of historical data node is calculated, so that the authentication result of stream process engine is more acurrate;Four there is provided a dynamic is anti- Adjustment module is presented, can be improved the accuracy of access control method.
Detailed description of the invention
Fig. 1 is the dynamic accesses control method schematic diagram that present invention request influenza is known
Fig. 2 is the flow chart of the dynamic accesses control method model of multi-dimensional state perception of the present invention
Fig. 3 is the structural block diagram of present invention request stream sensing module
Specific embodiment
To make the objectives, technical solutions, and advantages of the present invention clearer and more explicit, right as follows in conjunction with drawings and embodiments The present invention is further described.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and do not have to It is of the invention in limiting.
The present invention is suitable for the access control method under cloud computing environment.The invention proposes request data stream perception Dynamic accesses control method.It is with the maximum difference of existing method:One there is provided a kind of completely dynamic access control skills Art, the technology no longer restrain the formulation of static rule;Second is that the historical data of user is effectively utilized, gives one and pass through The method of historical data certification current request;Third is that the validity of historical data node is calculated, so that stream process engine is recognized It is more acurrate to demonstrate,prove result;Four there is provided a dynamic threshold adjustment modules, different from traditional artificial given threshold mode, the mould Block is capable of providing a kind of more flexible more accurate threshold value adjusting.
Fig. 1 describes request influenza of the invention and knows that dynamic accesses control method, Fig. 2 describe the dynamic that the present invention uses Access control model.
Step 1:Collect main body essential information and subjective environment information.When a user submits access request, this Method handle main body essential information relevant to access request and subjective environment information are as input.Main body essential information refers to and leads Body request relevant such as user information, resource information, operation information, subjective environment information is one with request body environmental correclation A little variables include the fragility, menace and integrality of environment.
Specifically, a terminal cloud user submits the access request to resource to cloud platform, the security engine in cloud platform The essential information of user is submitted to property engine and environment engine:Property engine collects the essential information of the user, and environment draws The subjective environment information for calculating the user is held up, then both information are submitted in access control module.
Step 2:Calculate the objective security coefficient of main body.The calculating of objective security coefficient is divided into main body essential information Several and subjective environment information security coefficient.
Access control module in cloud platform receives main body essential attribute information and subjective environment information, query strategy data Table calculates main body objective security coefficient.
The present invention is when it is implemented, specifically include step:
Step 2-1:Main body essential information safety coefficient P (zm) calculating
In calculating essential information safety coefficient, it is proposed that regular and related to request using attribute value description of access control Information.Each attribute is made of a key-value pair, such as " Role=Admin ".In different application scenarios, it is based on attribute Static policies rule it is also different.The related definition of this policing rule detection module is given below:
Define 1:Request → req (S, R, C, A), request req includes S, R, C, A, represents main body, resource, context environmental And operation.
Define 2:Attribute set → SA, RA, CA, AA, wherein:SA indicates body attribute, such as role, user group, User ID Deng these body attributes can be by obtaining in conversational services;RA indicates Resource Properties, for describing the attribute set of resource, Such as in an electronic health care system, indicate the health records of patient's ID attribute;CA context property, for describing requestor Context environmental, for example, request time, communication protocol, geographical location of requestor etc.;AA indicates operational attribute, that is, requests The movement that person wishes to carry out, such as common " reading " " writing " to file operate, and may be related in complex environment more Movement.
Define 3:Request attribute → ATT (S), ATT (R), ATT (C), ATT (A), they respectively correspond main body S, resource R, Context C, the attribute set for operating A:
Each attribute be then one such as<Attr, VAL, OP>The expression of triple.Wherein, attr refers to attribute, VAL table Show the value of attribute, OP is indicated for indicating the relational operator between att and VAL, such as "=" "<""∈".
Define 4:Whether policing rule → z, policing rule are legal for detecting request essential attribute.In security policy database, One strategy is expressed as { (ATT (S), ATT (R), ATT (C), ATT (A) | legal ∈ (0,1) }, and wherein legal indicates this rules and regulations It is then legal or illegal.
Policy data table is the set of the rule defined according to body attribute, object attribute and Resource Properties.
A plurality of policing rule may be needed to calculate the verifying of user request, pass through query strategy tables of data Obtain final main body essential information safety coefficient P (zm), such as one request may include attribute have:
ATT(S1)={ " department "=" sales ", " role "=" admin ", " manage level "≤" 3 " }
ATT(R1)={ " type "=" proposal document ", " region "=" W1 ", " level "≤" 4 " }
ATT(C1)={ " time " ∈<8:00,22:00>,0.5<Trust(IP)}
ATT(A1)={ " action "=" read " }
Each single item attribute is inquired by policy data table, obtains the corresponding regular inspection result of each single item attribute.Such as ATT (S)=" role " and the corresponding policy data table of ATT (S)=" age " are as shown in table 1.
1 policy data table (part) of table
z ATT(S) ATT(R) ATT(C) ATT(A)
z1 role:manager Type:Proposal-doc Time:<8:00,22:00> write
z2 age:44 Type:Proposal-doc Time:<20:00,22:00> Read
z3 age:20 Type:public-doc Trust (IP)=0.7 Write
z4 role:employee Type:public-doc Location:Chengdu Write Read
z5 role:sectary Type:private-doc Location:Chengdu Write
The corresponding regular inspection result of each single item attribute remembers zi, i=1,2,3 ..., zi∈ { 0,1 }, the comprehensive request are all The regular inspection result of attribute obtains main body essential information safety coefficient P (zm)
P(zm)=z1∩z2∩z3∩......
Search strategy tables of data, for each rule, when four attribute ATT (S) therein, ATT (R), ATT (C) and There is the regulation for being unsatisfactory for the rule in ATT (A), which is denoted as 0;As four attribute ATT therein (S), the regulation of the rule is all satisfied in ATT (R), ATT (C) and ATT (A), which is denoted as 1.That is P (zm) ∈ { 0,1 }, current request have the obstructed out-of-date P (z of an attribution rulem)=0, the P (z when all attribution rules all pass throughm) =1.
Step 2-2:Calculate subjective environment information security coefficient M (envi):To the vulnerability metric value of current topic environment PV, menace metric PT and integrity measurement value PR are weighted and obtain M (envi)。
The wherein PV of environment, PT, the metric form of PR are the usual metric form of this field, and value range is respectively 0 ≤ PV≤1,0≤PT≤1,0≤PR≤1, the present invention do not summarize.In the present invention, the specific value of PV, PT, PR can be by correlations Release mechanism provides.
That is subjective environment information security coefficient M (envi)=α * PV+ β * PT+ γ * PR, alpha+beta+γ=1, wherein α, beta, gamma divide Do not indicate the weight of these three indexs PV, PT, PR, specific weight depending on not homologous ray is by different security requirements, by Security Officer is configured.
Step 2-3:Combining main body essential information safety coefficient and subjective environment information security coefficient are calculated final Main body objective security coefficient.
Step 3:To the evaluation coefficient of current request, the access control module in cloud platform is passing through computation requests history stream After step 2 obtains main body objective security coefficient, data flow engine is inquired, a period of time window is obtained in data flow engine History flow data, impact factor and historical data stream by calculating similar record finally obtain history to the evaluation of estimate of itself Flow the evaluation coefficient to current request.
Referring to Fig. 3, the present invention is when it is implemented, specifically include step:
Step 3-1:Calculate the context influence measures factor, i.e., evaluation index of the similar main body to current request, the factor The trust value and environmental information of historical data point are reacted.Combining environmental evaluation of estimate evaluates user's context environment. Firstly, history window (being assumed to be n) whithin a period of time, calculates historical data stream to the context influence measures of current data point The factor, shown in model such as formula (1):
Wherein, the size n of window is according to different Environment Definitions.Current request vector is (reqm), calculate historical record Data measure the context of current request.In formula, j is indicated in window size before current request from m-n to m-1 Historical requests data.envmIndicate the context environmental vector of current request, envjIndicate the context of j-th of historical requests Environment vector, sim (envm,envj) indicate context environmental vector and similarity, M (envj) indicate the main body that step 2 calculates Environmental security coefficient.
Step 3-2:Calculate the impact factor TZ of similar recordm, TZmWhat is indicated is that historical data stream comments current request Valence, using a kind of analysis mode of data flow increment, R (reqm) it is evaluation coefficient of the history stream to current request, each The request of historical data stream has a R (reqj), TZmIt calculates as shown in formula (2):
Step 3-3:Evaluation of estimate TD of the calculating historical data stream to itselfm, this is because data flow there are concept drifts The problem of, with time, the variation of environment, the effect of some historical datas can drift about, historgraphic data recording itself affect Factor TDiIt calculates as shown in formula (3):
Step 3-4:Finally combine the two factors TZmAnd TDm, historical data stream is obtained to the evaluation coefficient R of current request (reqm), as shown in formula (4):
R(reqm)=α .TZi+β.TDi
{ α ∈ (0,1), β ∈ (0,1), alpha+beta=1 } (formula 4)
Can be in different environments by adjusting α, the weight of β adjusts historical data context environmental or self attributes Influence to current request, to obtain a more suitable and accurate result.For example, a cloud management user if it find that Their cloud computing environment dynamic characteristic with higher, can moderately adjust, and improve the value of α and reduce the value of β.
Step 4:Synthesis result is calculated, overall merit module is determined according to risk assessment and policing rule as a result, meter Final comprehensive evaluation result H (reqm) it is used for decision, it calculates as shown in formula (5):
H(reqm)=(1-dt) P (zm)+dt.R(reqm) (formula 5)
In above-mentioned formula, R (reqm) it is evaluation coefficient of the historical data stream to current request, P (zm) it is essential information safety Coefficient.Wherein, threshold parameter dt is dynamically adjusted by the practical application of the result of decision.
Step 5:According to synthesis result H (reqm) authorized, under normal conditions administrative staff can set a trust Value, when value-at-risk is just not authorized lower than this trust value.
The access control module of cloud platform is calculated after comprehensive evaluation result, and security centre is according to the big of this result It is small, it determines, if authorization, to allow for operation of the cloud user to request resource to submitting the cloud user of request authorize/refuse (such as reading and writing change operation);If refusal, the request of current cloud user can be ignored, this time result is only used as log recording to protect It deposits.
Step 6:After request terminates, threshold value dt is dynamically adjusted according to physical record, in historical record, for every One request requestiAll store corresponding attribute information, risk evaluation results R (reqi) and feedback factor fdi.Instead Present factor fdiIt is provided by service provider or resource provider, the result as verifying current accessed control.A such as warp The final overall merit obtained by this method, the result of decision are allow, are verified via service provider or resource quotient, this result is that Correctly, then fdiIt is 1, is otherwise 0, it is specific as shown in formula (6):
Feedback factor is to be obtained by practice effect, such as S1 is to the resource request of R1, at that time risk evaluation results It is 0.9, the final result of decision is allow, is most fed back afterwards through actual verification, this decision is correctly therefore feedback factor fdiIt is 1.
In conjunction with feedback factor fd all in historical recordi, the threshold value dt of calculation risk module can select and be verified Feedback factor, i.e. fdi=1, or the unacceptable feedback factor of verifying calculates, what the selection that this programme uses was verified fdiThreshold value is adjusted, as shown in formula (7),
In formula (7), k indicates the record quantity of phase of history time window, if fdi=0, then R (reqi)· fdi·Asi=0, which is negative-feedback;If fdi=1, then R (reqi)·fdi·Asi>0, which is positive feedback.At it In, it is also contemplated that operation susceptibility AsiInfluence, safe operation susceptibility is as shown in table 1.Finally positive and negative feedback is combined to obtain wind The threshold value dt of dangerous evaluation module, the threshold value can be used to adjust the weight of risk assessment in overall merit module.
2 safe operation susceptibility table of table
id ATT(A) As
1 It reads 0.2
2 Duplication 0.4
3 It writes 0.6
4 It executes 0.8
In conclusion a kind of dynamic accesses control method of multi-dimensional state perception provided by the present invention, makes access performance It improves:One there is provided a kind of completely dynamic access control technology, which no longer restrains the formulation of static rule;Second is that having The historical data that user is utilized of effect gives the method for authenticating current request by historical data;Third is that calculating The validity of historical data node, so that the authentication result of stream process engine is more acurrate;Four there is provided a dynamic threshold tune Module is saved, different from traditional artificial given threshold mode, which is capable of providing a kind of more flexible more accurate threshold value adjusting.
The above description is merely a specific embodiment, any feature disclosed in this specification, except non-specifically Narration, can be replaced by other alternative features that are equivalent or have similar purpose;Disclosed all features or all sides Method or in the process the step of, other than mutually exclusive feature and/or step, can be combined in any way.

Claims (7)

1. a kind of dynamic accesses control method of multi-dimensional state perception, which is characterized in that including step:
1) when cloud terminal user submits access request to cloud platform, main body essential information relevant to the access request is extracted With subjective environment information, wherein the main body essential information is essential attribute information relevant to the access request;The master Body environmental information is variable relevant to the access request subjective environment, fragility, menace and integrality including environment;
2) according to the main body essential information and subjective environment information, query strategy tables of data calculates main body essential information safety Coefficient, wherein policy data table is the set of the rule defined according to body attribute, object attribute and Resource Properties, subjective environment The calculating of information security coefficient passes through vulnerability metric value, menace metric and the integrity measurement value to current topic environment Weighted sum obtains, wherein the fragility, menace and integrity measurement value are provided by associated safety mechanism;
3) according to the subjective environment information security coefficient, evaluation coefficient of the historical data stream to current request, institute's commentary are calculated The impact factor and historical data stream that valence coefficient is record similar to current access request are to the weighted sum of the evaluation of estimate of itself;
4) the comprehensive main body essential information safety coefficient and the historical data stream work as the evaluation coefficient of current request The comprehensive evaluation result of preceding access request;
5) it is made a policy according to the comprehensive evaluation result to current access request:If comprehensive evaluation result is greater than or equal to default Access thresholds then allow current access request;Otherwise, refuse current access request.
2. dynamic accesses control method as described in claim 1, which is characterized in that further comprise that step 6) is based on a fixed number The access request of amount dynamically adjusts the comprehensive evaluation result.
3. dynamic accesses control method as claimed in claim 2, which is characterized in that calculating and current accessed in the step 3) Request the impact factor TZ of similar recordmSpecially:
The historical data stream is calculated first to the context influence measures factor P (req of current access requestm), using formulaWherein n indicates preset sizes of history window, (reqm) indicate current Access request vector, m indicate the identifier of current access request, and history access request identifier j is from m-n to m-1, envmIt indicates The context environmental vector of current access request, envjIndicate the context environmental vector of j-th of history access request, sim (envm,envj) indicate current access request and history access request context environmental vector similarity, M (envj) indicate Subjective environment information security coefficient;
Calculate the impact factor TZ of similar recordm, using formulaWherein P (reqj) indicate the The context influence measures factor of j history access request, R (reqj) indicate that j-th of history access request asks current accessed The evaluation coefficient asked;
Evaluation of estimate TD of the calculating historical data stream to itselfm, using formula
4. dynamic accesses control method as claimed in claim 3, which is characterized in that in the step 4), be based on the history Evaluation coefficient R (req of the data flow to current requestm) and the main body essential information safety coefficient P (zm) weighted sum obtain it is comprehensive Close evaluation result H (reqm), formula is expressed as H (reqm)=(1-dt) P (zm)+dt.R(reqm), wherein threshold value dt is default Value.
5. dynamic accesses control method as claimed in claim 4, which is characterized in that further include being based on a certain number of access The correctness of the decision of request dynamically adjusts the threshold value dt.
6. dynamic accesses control method as claimed in claim 5, which is characterized in that use formulaCalculate threshold value dt, wherein k indicates the access request of phase of history time window Quantity, access request reqiFeedback factor fdiFor verifying to access request reqiThe result of access control:If being asked to access Seek reqiDecision it is correct, then the feedback factor fdiIt is 1;It otherwise is 0;AsiIndicate access request reqiOperation susceptibility.
7. dynamic accesses control method as claimed in claim 6, which is characterized in that be based on access request reqiAction type, Obtain operation susceptibility AsiValue:
" reading " is operated, operation susceptibility is 0.2;
" duplication " is operated, operation susceptibility is 0.4;
" writing " is operated, operation susceptibility is 0.6;
" execution " is operated, operation susceptibility is 0.8.
CN201810686982.2A 2018-06-28 2018-06-28 Multi-dimensional state perception dynamic access control method Active CN108924120B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810686982.2A CN108924120B (en) 2018-06-28 2018-06-28 Multi-dimensional state perception dynamic access control method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810686982.2A CN108924120B (en) 2018-06-28 2018-06-28 Multi-dimensional state perception dynamic access control method

Publications (2)

Publication Number Publication Date
CN108924120A true CN108924120A (en) 2018-11-30
CN108924120B CN108924120B (en) 2020-09-25

Family

ID=64422882

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810686982.2A Active CN108924120B (en) 2018-06-28 2018-06-28 Multi-dimensional state perception dynamic access control method

Country Status (1)

Country Link
CN (1) CN108924120B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109543404A (en) * 2018-12-03 2019-03-29 北京芯盾时代科技有限公司 A kind of methods of risk assessment and device of access behavior
CN111931210A (en) * 2020-08-19 2020-11-13 中国移动通信集团江苏有限公司 Access control method, device, equipment and computer storage medium
CN111953633A (en) * 2019-05-15 2020-11-17 北京奇安信科技有限公司 Access control method and access control device based on terminal environment
CN114710340A (en) * 2022-03-25 2022-07-05 绿盟科技集团股份有限公司 Security authentication system and method
CN115514576A (en) * 2022-10-09 2022-12-23 中国南方电网有限责任公司 Access identity authentication method, device, equipment and medium for power monitoring system
CN117494163A (en) * 2023-11-06 2024-02-02 深圳市马博士网络科技有限公司 Data service method and device based on security rules

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104333542A (en) * 2014-10-23 2015-02-04 张勇平 Cloud computing access control system and method
CN104780159A (en) * 2015-03-23 2015-07-15 中国科学院信息工程研究所 Access control method based on dynamic trust thresholds
CN104935590A (en) * 2015-06-10 2015-09-23 南京航空航天大学 HDFS access control method based on role and user trust value
CN105245554A (en) * 2015-11-24 2016-01-13 无锡江南计算技术研究所 Dynamic property access control method in cloud environment
CN105493093A (en) * 2013-09-27 2016-04-13 英特尔公司 Mechanism for facilitating dynamic context-based access control of resources
CN105917627A (en) * 2014-02-07 2016-08-31 甲骨文国际公司 Cloud service custom execution environment
CN107395430A (en) * 2017-08-16 2017-11-24 中国民航大学 A kind of cloud platform dynamic risk access control method
CN107409126A (en) * 2015-02-24 2017-11-28 思科技术公司 System and method for protecting enterprise computing environment safety

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105493093A (en) * 2013-09-27 2016-04-13 英特尔公司 Mechanism for facilitating dynamic context-based access control of resources
CN105917627A (en) * 2014-02-07 2016-08-31 甲骨文国际公司 Cloud service custom execution environment
CN104333542A (en) * 2014-10-23 2015-02-04 张勇平 Cloud computing access control system and method
CN107409126A (en) * 2015-02-24 2017-11-28 思科技术公司 System and method for protecting enterprise computing environment safety
CN104780159A (en) * 2015-03-23 2015-07-15 中国科学院信息工程研究所 Access control method based on dynamic trust thresholds
CN104935590A (en) * 2015-06-10 2015-09-23 南京航空航天大学 HDFS access control method based on role and user trust value
CN105245554A (en) * 2015-11-24 2016-01-13 无锡江南计算技术研究所 Dynamic property access control method in cloud environment
CN107395430A (en) * 2017-08-16 2017-11-24 中国民航大学 A kind of cloud platform dynamic risk access control method

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
AHMED BOUCHAMI等: ""Enhancing Access-Control with Risk-Metrics for"", 《2015 IEEE TRUSTCOM/BIGDATASE/ISPA》 *
AIGUO CHEN等: ""A Dynamic Risk-based Access Control Model for Cloud Computing"", 《2016 IEEE INTERNATIONAL CONFERENCES ON BIG DATA AND CLOUD COMPUTING (BDCLOUD), SOCIAL COMPUTING AND NETWORKING (SOCIALCOM), SUSTAINABLE COMPUTING AND COMMUNICATIONS (SUSTAINCOM)》 *

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109543404A (en) * 2018-12-03 2019-03-29 北京芯盾时代科技有限公司 A kind of methods of risk assessment and device of access behavior
CN109543404B (en) * 2018-12-03 2019-10-25 北京芯盾时代科技有限公司 A kind of methods of risk assessment and device of access behavior
CN111953633A (en) * 2019-05-15 2020-11-17 北京奇安信科技有限公司 Access control method and access control device based on terminal environment
CN111931210A (en) * 2020-08-19 2020-11-13 中国移动通信集团江苏有限公司 Access control method, device, equipment and computer storage medium
CN114710340A (en) * 2022-03-25 2022-07-05 绿盟科技集团股份有限公司 Security authentication system and method
CN114710340B (en) * 2022-03-25 2023-05-23 绿盟科技集团股份有限公司 Security authentication system and method
CN115514576A (en) * 2022-10-09 2022-12-23 中国南方电网有限责任公司 Access identity authentication method, device, equipment and medium for power monitoring system
CN117494163A (en) * 2023-11-06 2024-02-02 深圳市马博士网络科技有限公司 Data service method and device based on security rules
CN117494163B (en) * 2023-11-06 2024-05-31 深圳市马博士网络科技有限公司 Data service method and device based on security rules

Also Published As

Publication number Publication date
CN108924120B (en) 2020-09-25

Similar Documents

Publication Publication Date Title
CN108924120A (en) A kind of dynamic accesses control method of multi-dimensional state perception
US20220012672A1 (en) Systems and methods for score genration for applicant tracking
US20220353274A1 (en) Managing verification repositories to facilitate real-time servicing of verification queries
US11146394B2 (en) Systems and methods for biometric key generation in data access control, data verification, and path selection in block chain-linked workforce data management
CN107395430B (en) Cloud platform dynamic risk access control method
US9059982B2 (en) Authentication federation system and ID provider device
US10984410B2 (en) Entity-sovereign data wallets using distributed ledger technology
EP3736723B1 (en) Differentially private budget tracking using renyi divergence
US20090271635A1 (en) Methods and systems for authentication
EP3923207A2 (en) Clustering techniques for machine learning models
CN108804909B (en) Method for carrying out block chaining evidence storage processing on detection data
EP3742700B1 (en) Method, product, and system for maintaining an ensemble of hierarchical machine learning models for detection of security risks and breaches in a network
CN106209821A (en) The big data management system of information security based on credible cloud computing
KR101250616B1 (en) An access right control method and device in social networks
Sun Research on the tradeoff between privacy and trust in cloud computing
CN116186757A (en) Method for publishing condition feature selection differential privacy data with enhanced utility
WO2023192175A1 (en) Device-agnostic access control techniques
Saha et al. A novel two phase data sensitivity based access control framework for healthcare data
Shen et al. Blockchain-based lightweight and privacy-preserving quality assurance framework in crowdsensing systems
CN113824739B (en) User authority management method and system of cloud management platform
CN113392385B (en) User trust measurement method and system in cloud environment
CA3179224A1 (en) Bias detection and reduction in a machine-learning techniques
WO2020130082A1 (en) Analysis query response system, analysis query execution device, analysis query verification device, analysis query response method, and program
CN113486311B (en) Access authorization method and device
CN117278329B (en) Application resource dynamic control access method based on zero trust gateway

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant