• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

使用多策略访问控制系统限制内部人员访问的线性时间算法。

Linear Time Algorithms to Restrict Insider Access using Multi-Policy Access Control Systems.

作者信息

Mell Peter, Shook James, Harang Richard, Gavrila Serban

机构信息

National Institute of Standards and Technology, 100 Bureau Drive, Gaithersburg, MD 20899.

U.S. Army Research Laboratory, Adelphi, MD United States.

出版信息

J Wirel Mob Netw Ubiquitous Comput Dependable Appl. 2017 Mar;8(1):4-25.

PMID:28758045
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC5528852/
Abstract

An important way to limit malicious insiders from distributing sensitive information is to as tightly as possible limit their access to information. This has always been the goal of access control mechanisms, but individual approaches have been shown to be inadequate. Ensemble approaches of multiple methods instantiated simultaneously have been shown to more tightly restrict access, but approaches to do so have had limited scalability (resulting in exponential calculations in some cases). In this work, we take the Next Generation Access Control (NGAC) approach standardized by the American National Standards Institute (ANSI) and demonstrate its scalability. The existing publicly available reference implementations all use cubic algorithms and thus NGAC was widely viewed as not scalable. The primary NGAC reference implementation took, for example, several minutes to simply display the set of files accessible to a user on a moderately sized system. In our approach, we take these cubic algorithms and make them linear. We do this by reformulating the set theoretic approach of the NGAC standard into a graph theoretic approach and then apply standard graph algorithms. We thus can answer important access control decision questions (e.g., which files are available to a user and which users can access a file) using linear time graph algorithms. We also provide a default linear time mechanism to visualize and review user access rights for an ensemble of access control mechanisms. Our visualization appears to be a simple file directory hierarchy but in reality is an automatically generated structure abstracted from the underlying access control graph that works with any set of simultaneously instantiated access control policies. It also provide an implicit mechanism for symbolic linking that provides a powerful access capability. Our work thus provides the first efficient implementation of NGAC while enabling user privilege review through a novel visualization approach. This may help transition from concept to reality the idea of using ensembles of simultaneously instantiated access control methodologies, thereby limiting insider threat.

摘要

限制恶意内部人员分发敏感信息的一个重要方法是尽可能严格地限制他们对信息的访问。这一直是访问控制机制的目标,但已证明个别方法并不充分。同时实例化多种方法的集成方法已被证明能更严格地限制访问,但这样做的方法扩展性有限(在某些情况下会导致指数级计算)。在这项工作中,我们采用了美国国家标准学会(ANSI)标准化的下一代访问控制(NGAC)方法,并展示了其可扩展性。现有的公开可用参考实现都使用立方算法,因此NGAC被广泛认为不可扩展。例如,主要的NGAC参考实现在一个中等规模的系统上仅仅显示用户可访问的文件集就需要几分钟。在我们的方法中,我们采用这些立方算法并使其线性化。我们通过将NGAC标准的集合论方法重新表述为图论方法,然后应用标准图算法来实现这一点。因此,我们可以使用线性时间图算法回答重要的访问控制决策问题(例如,哪些文件可供用户使用以及哪些用户可以访问一个文件)。我们还提供了一种默认的线性时间机制,用于可视化和审查一组访问控制机制的用户访问权限。我们的可视化看起来像是一个简单的文件目录层次结构,但实际上是一个从底层访问控制图抽象出来的自动生成的结构,它适用于任何一组同时实例化的访问控制策略。它还提供了一种用于符号链接的隐式机制,该机制提供了强大的访问能力。我们的工作因此提供了NGAC的首个高效实现,同时通过一种新颖的可视化方法实现了用户权限审查。这可能有助于将同时实例化访问控制方法集的想法从概念转变为现实,从而限制内部威胁。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/02dc/5528852/b5d7b00b8b42/nihms875070f11.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/02dc/5528852/fe75828f387b/nihms875070f1.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/02dc/5528852/98d2de5d06d2/nihms875070f2.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/02dc/5528852/a0bca86a99ae/nihms875070f3.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/02dc/5528852/ab9f586d92ad/nihms875070f4.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/02dc/5528852/d21d31d5e3ac/nihms875070f5.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/02dc/5528852/b5e5b0de3aee/nihms875070f6.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/02dc/5528852/549048743c5a/nihms875070f7.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/02dc/5528852/f4988baaf080/nihms875070f8.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/02dc/5528852/cf69bbf8318d/nihms875070f9.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/02dc/5528852/d75940dacf73/nihms875070f10.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/02dc/5528852/b5d7b00b8b42/nihms875070f11.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/02dc/5528852/fe75828f387b/nihms875070f1.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/02dc/5528852/98d2de5d06d2/nihms875070f2.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/02dc/5528852/a0bca86a99ae/nihms875070f3.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/02dc/5528852/ab9f586d92ad/nihms875070f4.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/02dc/5528852/d21d31d5e3ac/nihms875070f5.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/02dc/5528852/b5e5b0de3aee/nihms875070f6.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/02dc/5528852/549048743c5a/nihms875070f7.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/02dc/5528852/f4988baaf080/nihms875070f8.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/02dc/5528852/cf69bbf8318d/nihms875070f9.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/02dc/5528852/d75940dacf73/nihms875070f10.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/02dc/5528852/b5d7b00b8b42/nihms875070f11.jpg

相似文献

1
Linear Time Algorithms to Restrict Insider Access using Multi-Policy Access Control Systems.使用多策略访问控制系统限制内部人员访问的线性时间算法。
J Wirel Mob Netw Ubiquitous Comput Dependable Appl. 2017 Mar;8(1):4-25.
2
The need for the use of XACML access control policy in a distributed EHR and some performance considerations.在分布式电子健康记录中使用XACML访问控制策略的必要性及一些性能考量。
Stud Health Technol Inform. 2008;137:346-52.
3
An Investigation of Insider Threat Mitigation Based on EEG Signal Classification.基于脑电信号分类的内部威胁缓解研究。
Sensors (Basel). 2020 Nov 8;20(21):6365. doi: 10.3390/s20216365.
4
Sorting Insiders From Co-Workers: Remote Synchronous Computer-Mediated Triage for Investigating Insider Attacks.从同事中甄别内鬼:用于调查内部攻击的远程同步计算机中介分诊。
Hum Factors. 2024 Jan;66(1):145-157. doi: 10.1177/00187208211068292. Epub 2022 Mar 7.
5
Folic acid supplementation and malaria susceptibility and severity among people taking antifolate antimalarial drugs in endemic areas.在流行地区,服用抗叶酸抗疟药物的人群中,叶酸补充剂与疟疾易感性和严重程度的关系。
Cochrane Database Syst Rev. 2022 Feb 1;2(2022):CD014217. doi: 10.1002/14651858.CD014217.
6
A Graph-based Framework for ABAC Policy Enforcement and Analysis.一种基于图的ABAC策略执行与分析框架。
Data Appl Secur Priv XXXII (2024). 2024 Jul;14901:3-23. doi: 10.1007/978-3-031-65172-4_1. Epub 2024 Jul 13.
7
Queuing Theoretic Analysis of Dynamic Attribute-Based Access Control Systems.基于动态属性的访问控制系统的排队论分析
IFIP Adv Inf Commun Technol. 2024 Jun;2024:323-337. doi: 10.1007/978-3-031-65175-5_23. Epub 2024 Jul 26.
8
The future of Cochrane Neonatal.考克兰新生儿协作网的未来。
Early Hum Dev. 2020 Nov;150:105191. doi: 10.1016/j.earlhumdev.2020.105191. Epub 2020 Sep 12.
9
Qualitative Study定性研究
10
Techniques and countermeasures for preventing insider threats.预防内部威胁的技术与对策。
PeerJ Comput Sci. 2022 Apr 1;8:e938. doi: 10.7717/peerj-cs.938. eCollection 2022.

引用本文的文献

1
MES-FPMIPv6: MIH-Enabled and enhanced secure Fast Proxy Mobile IPv6 handover protocol for 5G networks.MES-FPMIPv6:用于5G网络的启用MIH并增强的安全快速代理移动IPv6切换协议。
PLoS One. 2022 May 26;17(5):e0262696. doi: 10.1371/journal.pone.0262696. eCollection 2022.
2
Techniques and countermeasures for preventing insider threats.预防内部威胁的技术与对策。
PeerJ Comput Sci. 2022 Apr 1;8:e938. doi: 10.7717/peerj-cs.938. eCollection 2022.
3
Acceptability Evaluation of the Use of Virtual Reality Games in Smoking-Prevention Education for High School Students: Prospective Observational Study.虚拟现实游戏在高中生戒烟教育中应用的可接受性评估:前瞻性观察研究。
J Med Internet Res. 2021 Sep 28;23(9):e28037. doi: 10.2196/28037.
4
Efficient Resource Allocation for Backhaul-Aware Unmanned Air Vehicles-to-Everything (U2X).面向回程感知的无人机到万物(U2X)的高效资源分配
Sensors (Basel). 2020 May 25;20(10):2994. doi: 10.3390/s20102994.