Formalization and Quantitative Analysis of Controllability on Internet Information Security

نویسندگان

  • Lihua Yin
  • Binxing Fang
  • Yunchuan Guo
  • Hui He
چکیده

Traditional information security models focus on protecting information or information systems. There is little research on controllability of Internet information security. We present network reference monitor (NRM) for access control in Internet environment. Then we propose the defi nition of network reference monitor and Internet information access control. Abstract operation model is put forward for controllability of Internet access control. The model consists of three parts: information discovery model, information analysis model and information control model. Next, we express the intuitive formal specifi cation of controllability by PCTL logic. Then we characterize the process of Internet access control by fi nite state automata and present an evaluation model of controllability. Control Rate and Control Leak Rate are given to analyze access control of Internet information security quantitatively.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Effect of IT on Organizational Structure (Case study: Refah bank in Guilan)

Undoubtedly, information technology (IT) has undergone extensive developments in various social and economic spheres; its effect on human society is in such a way that the world today is referred as information society. Besides, information technology, attributed as the main agent of global change, is to achieve meta- organization purposes. It also pertains to appropriate information formulated...

متن کامل

The Effect of IT on Organizational Structure (Case study: Refah bank in Guilan)

Undoubtedly, information technology (IT) has undergone extensive developments in various social and economic spheres; its effect on human society is in such a way that the world today is referred as information society. Besides, information technology, attributed as the main agent of global change, is to achieve meta- organization purposes. It also pertains to appropriate information formulated...

متن کامل

Computer security in the future

Until recently, computer security was an obscure discipline that seemed to have little relevance to everyday life. With the rapid growth of the Internet, e-commerce, and the widespread use of computers, computer security touches almost all aspects of daily life and all parts of society. Even those who do not use computers have information about them stored on computers. This paper reviews some ...

متن کامل

Detecting Bot Networks Based On HTTP And TLS Traffic Analysis

Abstract— Bot networks are a serious threat to cyber security, whose destructive behavior affects network performance directly. Detecting of infected HTTP communications is a big challenge because infected HTTP connections are clearly merged with other types of HTTP traffic. Cybercriminals prefer to use the web as a communication environment to launch application layer attacks and secretly enga...

متن کامل

Internet (Information/Skill) Literacy in Iran

This study examines the associations of internet information literacy with two variables: (1) the ability to work with technical aspects of the internet (internet skill), and (2) attitudes about the need for qualitative necessities in the development of e-services. A hierarchical regressions software analyzes data from a national sample of 2134 internet users. In this paper, internet literacy i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IJWA

دوره 2  شماره 

صفحات  -

تاریخ انتشار 2010