信息网络安全 ›› 2014, Vol. 14 ›› Issue (12): 71-75.doi: 10.3969/j.issn.1671-1122.2014.12.015
Previous Articles Next Articles
GUO Fei, ZHANG Hua, GAO Fei
Received:
2014-10-14
Online:
2014-12-15
CLC Number:
GUO Fei, ZHANG Hua, GAO Fei. Research and Implement on Dynamic Access Control Model Based on User’s Behavior in SaaS[J]. 信息网络安全, 2014, 14(12): 71-75.
Add to citation manager EndNote|Ris|BibTeX
URL: http://netinfo-security.org/EN/10.3969/j.issn.1671-1122.2014.12.015
[1] LIANG J T, JIANG X Y. Trust Model of Web Services Based on Subjective Logic[J]. Journal of South China University of Technology (Nature Science), 2005, 33(10): 24-28. [2] 冯登国,张敏. 云计算安全研究[J]. 软件学报,2011,22(1):71-83. [3] 朱养鹏,张璟. SaaS平台访问控制研究[J] 计算机工程与应用,2011,47(24):12-16. [4] 田立勤,冀铁果. 一种基于用户行为信任的动态角色访问控制[J]. 计算机工程与应用,2008,44(19):12-15. [5] TIAN L Q, LIN C, NI Y. Evaluation of User Behavior Trust in Cloud Computing[C]//ICCASM 20lO: Proceedings the 20lO International Conference on Computer Application and System Modeling. Piscataway: IEEE, 2010: V7-567-V7-572. [6] 田立勤. 网络用户行为的安全可信分析与控制[M]. 北京:清华大学出版社,2011. [7] 张吉军. 模糊层次分析法(FAHP)[J]. 模糊系统与数学,2000,14(2):80-88. [8] 陈欣. 模糊层次分析法在方案优选方面的应用[J]. 计算机工程与设计,2004,25(10):1847-1849. [9] 张显龙. 云计算安全总体框架与关键技术研究[J]. 信息网络安全,2013,(7):28-31. [10] 赵鸣,江肖强. 可提供云服务的主动性服务器安全监测系统[J]. 信息网络安全,2013,(10):69-70. |
[1] | LIU Jianwei, HAN Yiran, LIU Bin, YU Beiyuan. Research on 5G Network Slicing Security Model [J]. Netinfo Security, 2020, 20(4): 1-11. |
[2] | JIANG Jinfang, HAN Guangjie. Survey of Trust Management Mechanism in Wireless Sensor Network [J]. Netinfo Security, 2020, 20(4): 12-20. |
[3] | CHEN Lu, SUN Yajie, ZHANG Liqiang, CHEN Yun. A Scheme of Measurement for Terminal Equipment Based on DICE in IoT [J]. Netinfo Security, 2020, 20(4): 21-30. |
[4] | GUO Chun, CHEN Changqing, SHEN Guowei, JIANG Chaohui. A Ransomware Classification Method Based on Visualization [J]. Netinfo Security, 2020, 20(4): 31-39. |
[5] | DONG Xiaoli, SHANG Shuai, CHEN Jie. Impossible Differential Attacks on 9-Round Block Cipher Rijndael-192 [J]. Netinfo Security, 2020, 20(4): 40-46. |
[6] | WANG Rong, MA Chunguang, WU Peng. An Intrusion Detection Method Based on Federated Learning and Convolutional Neural Network [J]. Netinfo Security, 2020, 20(4): 47-54. |
[7] | FU Zhizhou, WANG Liming, TANG Ding, ZHANG Shuguang. HBase Secondary Ciphertext Indexing Method Based on Homomorphic Encryption [J]. Netinfo Security, 2020, 20(4): 55-64. |
[8] | DU Yifeng, GUO Yuanbo. A Dynamic Access Control Method for Fog Computing Based on Trust Value [J]. Netinfo Security, 2020, 20(4): 65-72. |
[9] | BIAN Lingyu, ZHANG Linlin, ZHAO Kai, SHI Fei. Ethereum Malicious Account Detection Method Based on LightGBM [J]. Netinfo Security, 2020, 20(4): 73-80. |
[10] | LIU Min, CHEN Shuhui. Research on VoLTE Traffic Based on Association Fusion [J]. Netinfo Security, 2020, 20(4): 81-86. |
[11] | ZHAO Zhiyan, JI Xiaomo. Research on the Intelligent Fusion Model of Network Security Situation Awareness [J]. Netinfo Security, 2020, 20(4): 87-93. |
[12] | MA Li. Research on the Quantitative Calculation Method Resulting from the Conclusions in the Assessment of Classified Protection of Cybersecurity [J]. Netinfo Security, 2020, 20(3): 1-8. |
[13] | SONG Yubo, FAN Ming, YANG Junjie, HU Aiqun. Multipath Solution and Blocking Method of Network Attack Traffic Based on Topology Analysis [J]. Netinfo Security, 2020, 20(3): 9-17. |
[14] | LI Ning, LI Bochao. Token-based UTM Architecture for Mobile Internet [J]. Netinfo Security, 2020, 20(3): 18-28. |
[15] | ZHOU Quan, YANG Ningbin, XU Shumei. Fault - tolerant and Verifiable Public Key Searchable Encryption Scheme Based on FBDH Algorithm [J]. Netinfo Security, 2020, 20(3): 29-35. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||