Formalization and Quantitative Analysis of Controllability on Internet Information Security
نویسندگان
چکیده
Traditional information security models focus on protecting information or information systems. There is little research on controllability of Internet information security. We present network reference monitor (NRM) for access control in Internet environment. Then we propose the defi nition of network reference monitor and Internet information access control. Abstract operation model is put forward for controllability of Internet access control. The model consists of three parts: information discovery model, information analysis model and information control model. Next, we express the intuitive formal specifi cation of controllability by PCTL logic. Then we characterize the process of Internet access control by fi nite state automata and present an evaluation model of controllability. Control Rate and Control Leak Rate are given to analyze access control of Internet information security quantitatively.
منابع مشابه
The Effect of IT on Organizational Structure (Case study: Refah bank in Guilan)
Undoubtedly, information technology (IT) has undergone extensive developments in various social and economic spheres; its effect on human society is in such a way that the world today is referred as information society. Besides, information technology, attributed as the main agent of global change, is to achieve meta- organization purposes. It also pertains to appropriate information formulated...
متن کاملThe Effect of IT on Organizational Structure (Case study: Refah bank in Guilan)
Undoubtedly, information technology (IT) has undergone extensive developments in various social and economic spheres; its effect on human society is in such a way that the world today is referred as information society. Besides, information technology, attributed as the main agent of global change, is to achieve meta- organization purposes. It also pertains to appropriate information formulated...
متن کاملComputer security in the future
Until recently, computer security was an obscure discipline that seemed to have little relevance to everyday life. With the rapid growth of the Internet, e-commerce, and the widespread use of computers, computer security touches almost all aspects of daily life and all parts of society. Even those who do not use computers have information about them stored on computers. This paper reviews some ...
متن کاملDetecting Bot Networks Based On HTTP And TLS Traffic Analysis
Abstract— Bot networks are a serious threat to cyber security, whose destructive behavior affects network performance directly. Detecting of infected HTTP communications is a big challenge because infected HTTP connections are clearly merged with other types of HTTP traffic. Cybercriminals prefer to use the web as a communication environment to launch application layer attacks and secretly enga...
متن کاملInternet (Information/Skill) Literacy in Iran
This study examines the associations of internet information literacy with two variables: (1) the ability to work with technical aspects of the internet (internet skill), and (2) attitudes about the need for qualitative necessities in the development of e-services. A hierarchical regressions software analyzes data from a national sample of 2134 internet users. In this paper, internet literacy i...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IJWA
دوره 2 شماره
صفحات -
تاریخ انتشار 2010