CN104811442A - Access control method based on feedback evaluation mechanism - Google Patents
Access control method based on feedback evaluation mechanism Download PDFInfo
- Publication number
- CN104811442A CN104811442A CN201510145813.4A CN201510145813A CN104811442A CN 104811442 A CN104811442 A CN 104811442A CN 201510145813 A CN201510145813 A CN 201510145813A CN 104811442 A CN104811442 A CN 104811442A
- Authority
- CN
- China
- Prior art keywords
- evaluation
- access
- subject
- feedback
- state
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000011156 evaluation Methods 0.000 title claims abstract description 130
- 238000000034 method Methods 0.000 title claims abstract description 22
- 230000007246 mechanism Effects 0.000 title claims abstract description 7
- 230000007704 transition Effects 0.000 claims abstract description 13
- 239000011159 matrix material Substances 0.000 claims abstract description 11
- 230000003542 behavioural effect Effects 0.000 claims 1
- 238000011161 development Methods 0.000 description 4
- 238000010276 construction Methods 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 238000011160 research Methods 0.000 description 3
- 230000008859 change Effects 0.000 description 1
- 238000010835 comparative analysis Methods 0.000 description 1
- 238000011217 control strategy Methods 0.000 description 1
- 230000001066 destructive effect Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 238000005309 stochastic process Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Landscapes
- Storage Device Security (AREA)
Abstract
本发明公开了一种基于反馈评价机制的访问控制方法,其步骤为:1)建立主体访问行为诚信评价的分级标准,组成马尔可夫链的状态空间;2)根据主体访问过的客体对其行为的评价等级信息,统计该主体得到的各评价状态的初始分布;3)将该主体当前时刻评价状态信息与上一时刻评价状态信息对比,建立状态转移矩阵;4)根据所述状态转移矩阵与评价状态初始分布,计算该主体下一步访问行为的状态绝对概率分布;5)按照最大概率原则,确定该主体即将访问行为的评价等级;然后判断该评价等级是否属于访问权限要求的访问反馈评价等级集合。如果属于,访问被许可;否则,访问被拒绝。本发明方法可以有效避免访问欺诈风险,实现访问权限安全管理。
The invention discloses an access control method based on a feedback evaluation mechanism, the steps of which are as follows: 1) establishing a grading standard for credit evaluation of a subject's access behavior to form a state space of a Markov chain; The evaluation level information of the behavior, the initial distribution of each evaluation state obtained by the subject; 3) The evaluation state information of the subject at the current moment is compared with the evaluation state information of the previous moment, and a state transition matrix is established; 4) According to the state transition matrix Calculate the absolute probability distribution of the subject's next access behavior based on the initial distribution of the evaluation state; 5) Determine the evaluation level of the subject's upcoming access behavior according to the principle of maximum probability; then judge whether the evaluation level belongs to the access feedback evaluation required by the access authority Grade collection. If yes, access is granted; otherwise, access is denied. The method of the invention can effectively avoid the risk of access fraud and realize the security management of access authority.
Description
技术领域technical field
本发明属于计算机网络安全领域,具体涉及一种基于反馈评价机制的访问控制方法。The invention belongs to the field of computer network security, and in particular relates to an access control method based on a feedback evaluation mechanism.
背景技术Background technique
在开放式网络环境中,实体的访问行为具有很强的自主性和不确定性,实体可以随时加入某个网络获取资源和服务,也可以随时中断与该网络的连接。实体的某些访问请求可能带有恶意企图,直接执行访问可能会对资源造成破坏性的后果,确保对资源或服务访问的安全性成为开放式网络中的一个关键问题。In an open network environment, the access behavior of entities has strong autonomy and uncertainty. Entities can join a network at any time to obtain resources and services, and can also disconnect from the network at any time. Certain access requests of entities may have malicious intentions, and direct execution of access may cause destructive consequences to resources. Ensuring the security of access to resources or services has become a key issue in open networks.
在开放式网络环境中,一些重要资源的访问权限决策不但有“质”的属性,同时还有“量”的属性。但在当前研究的访问控制策略中,众多学者更关注访问控制权限“质”的属性,而忽视了访问控制权限“量”的属性。In an open network environment, some important resource access decisions not only have "quality" attributes, but also "quantity" attributes. However, in the current research on access control strategies, many scholars pay more attention to the "quality" attribute of access control permissions, while ignoring the "quantity" attribute of access control permissions.
事物的发展状态总是随着时间的推移而不断变化的。应用马尔可夫过程的理论,从实测时间序列中总结出随机过程的概率规律,主要以状态之间转移概率为研究对象。当事物发展的状态和时间均为离散型时的马尔可夫过程称为马尔可夫链。它最基本的特征是“无后效应”,即在系统“当前”状态已知的前提下,其“将来”的状态发展与“历史”无关。应用马尔可夫链模型解决对事物发展预测问题的基本思想是,如果具有各种状态的某种系统的时间序列视为马尔可夫链,那么根据第n个时刻状态即可推测第n+1个时刻的状态。近年来,马尔可夫链预测模型在网页浏览行为预测、网络安全检测与分析等研究中运用较为广泛。The state of development of things is always changing with the passage of time. Applying the theory of Markov process, the probability law of stochastic process is summarized from the measured time series, mainly taking the transition probability between states as the research object. When the state and time of the development of things are both discrete, the Markov process is called a Markov chain. Its most basic feature is "no aftereffect", that is, on the premise that the "current" state of the system is known, its "future" state development has nothing to do with "history". The basic idea of applying the Markov chain model to solve the problem of predicting the development of things is that if the time series of a certain system with various states is regarded as a Markov chain, then the n+1th state can be inferred according to the state at the nth moment state of a moment. In recent years, the Markov chain prediction model has been widely used in web browsing behavior prediction, network security detection and analysis and other research.
访问反馈评价机制是对主体每次访问行为的诚信,根据访问结果,进行事后评价,并将访问反馈评价结果进行详细“备案”记录。The visit feedback and evaluation mechanism is to evaluate the integrity of each visit behavior of the subject, conduct post-event evaluation according to the visit results, and record the visit feedback and evaluation results in detail.
从访问控制权限“量”的属性角度,根据客体所拥有反馈评价数据,对其应用马尔可夫模型进行访问行为的诚信预测,为本次访问权限控制提供决策依据。From the perspective of the "quantity" attribute of the access control authority, according to the feedback and evaluation data owned by the object, the Markov model is used to predict the integrity of the access behavior, which provides a decision-making basis for this access authority control.
发明内容Contents of the invention
本发明的目的是提供一种基于反馈评价机制的访问控制方法。将主体的访问行为预测抽象为一个马尔可夫模型,应用马尔可夫链对主体的访问行为进行诚信预测。根据网络中各客体所拥有的反馈评价数据,从中选取一定数量针对本次访问主体的历史反馈评价数据,构成访问反馈评价状态表,反映出主体访问行为的动态变化。引用转移概率矩阵,应用马尔可夫模型对主体访问行为的诚信度进行预测,并依据该诚信度判定访问权限的授予与否。本方法应用历史访问反馈数据,可以有效避免访问欺诈风险,实现访问控制权限的安全管理。The purpose of the present invention is to provide an access control method based on a feedback evaluation mechanism. The subject's access behavior prediction is abstracted as a Markov model, and the Markov chain is used to predict the integrity of the subject's access behavior. According to the feedback and evaluation data owned by each object in the network, a certain amount of historical feedback and evaluation data for the subject of this visit is selected from it to form a visit feedback and evaluation status table, which reflects the dynamic changes of the subject's visit behavior. Citing the transition probability matrix, the Markov model is used to predict the integrity of the subject's access behavior, and the granting of access rights is judged based on the integrity. The method applies the historical access feedback data, can effectively avoid the risk of access fraud, and realize the security management of access control authority.
本发明采取如下技术方案。The present invention adopts the following technical solutions.
一、访问反馈评价等级的划分1. Classification of Visit Feedback Evaluation Levels
客体依据对主体授予的访问权限,参考主体实施的访问结果,对主体进行访问的满意程度进行反馈评价。访问反馈评价结果划分为诚信、欺诈和非欺诈等m个等级,分别用K0,K1,...,Km-1表示,每个等级与一个访问反馈满意度区间相对应,如表1所示。Based on the access rights granted to the subject, the object makes feedback and evaluation on the satisfaction degree of the subject's visit with reference to the visit results implemented by the subject. The evaluation results of visit feedback are divided into m grades such as honesty, fraud and non-fraud, which are represented by K 0 , K 1 , ..., K m-1 respectively, and each grade corresponds to a satisfaction interval of visit feedback, as shown in Table 1.
表1访问反馈满意度隶属的评价等级Table 1 Evaluation grades of interview feedback satisfaction
其中,0≤αi<αi+1≤1,0≤i≤m-1。Wherein, 0≤α i <α i+1 ≤1, 0≤i≤m-1.
二、客体评价表的构建2. Construction of object evaluation table
为每个客体建立一个客体评价表,用以存储访问过该客体的所有主体的历史信息,表结构主要包括:主体IP地址、访问时间、访问权限、反馈满意度和反馈评价等级等信息。An object evaluation table is established for each object to store the historical information of all subjects who have visited the object. The table structure mainly includes: subject IP address, access time, access authority, feedback satisfaction and feedback evaluation level and other information.
当主体访问客体时,客体根据IP等主体标识,查找本客体评价表,如果查找到评价表的第一个该主体的访问历史记录,则将本次访问信息插入到上次访问历史信息之前;否则,查找到评价表的最后一条记录,也没有该主体的历史访问信息,说明主体首次访问本客体,则将本次访问信息记录追加至客体评价表的最后。客体评价表的记录只有本客体具有写和修改的权限,但可以被其它客体读取相关的主体评价信息。When the subject visits the object, the object searches the evaluation table of the object according to the subject identification such as IP, and if the first access history record of the subject is found in the evaluation table, the information of this visit is inserted before the history information of the last visit; Otherwise, if the last record of the evaluation table is found, and there is no historical access information of the subject, it means that the subject visits the object for the first time, then add this access information record to the end of the object evaluation table. Only the object has the permission to write and modify the records of the object evaluation table, but other objects can read the relevant subject evaluation information.
三、主体访问记录表的构建3. Construction of subject access record table
为了使主体的历史访问行为信息在应用环境内充分共享,在每个主体构建一个主体访问记录表,用来记录该主体访问过的所有客体信息,主体访问记录表结构包括:访问客体的标识、访问时间以及访问客体的评价表地址等。但是,只有被请求访问的客体才拥有对主体访问记录表的读和写操作权限。In order to fully share the historical access behavior information of the subject in the application environment, a subject access record table is constructed in each subject to record all the object information that the subject has visited. The structure of the subject access record table includes: the identification of the accessed object, Visiting time and the address of the evaluation form of the interviewed object, etc. However, only the requested object has read and write access to the subject access record table.
在允许主体访问之前,客体先查找主体访问记录表。如果找到自己的历史记录,核实一下自己的相关信息,并对访问时间等信息更新;否则,即该主体首次访问本客体,则客体先将自己的标识以及客体评价表的入口地址等信息追加到主体访问记录中。Before allowing the subject to access, the object first looks up the subject's access record table. If you find your own historical records, verify your own relevant information, and update the access time and other information; otherwise, that is, the subject visits the object for the first time, then the object first adds information such as its own identity and the entry address of the object evaluation table to Subject access records.
四、主体反馈评价状态表的构建4. Construction of Subject Feedback Evaluation Status Table
假设主体访问时刻为ti,根据主体访问记录表,按照访问时间的先后顺序,选取该主体访问过的n个不同客体,从n个客体评价表中读取客体对该主体的反馈评价等级等数据,将这些数据保存在反馈评价状态表中。其中,n的大小根据不同的系统要求而选取。反馈评价状态表结构包括访问时间、客体IP和反馈评价等级等信息,如表2所示。Assuming that the subject’s visit time is t i , according to the subject’s visit record table, according to the order of visit time, select n different objects that the subject has visited, and read the object’s feedback evaluation level to the subject from the n object evaluation tables, etc. data, and save these data in the feedback evaluation status table. Wherein, the size of n is selected according to different system requirements. The feedback evaluation state table structure includes information such as access time, object IP and feedback evaluation level, as shown in Table 2.
表2访问反馈评价状态表Table 2 Access Feedback Evaluation Status Table
五、基于马尔可夫链的访问行为预测5. Access Behavior Prediction Based on Markov Chain
在开放式网络环境中,主体的诚信程度是其访问行为的体现。如果一个主体当前状态被评价为诚信的概率越大,那么该主体下次被预测为诚信访问行为的概率就越大。In an open network environment, the integrity of the subject is the embodiment of its access behavior. If the probability that a subject's current status is evaluated as honest is higher, then the probability that the subject will be predicted as honest access behavior next time is higher.
应用马尔可夫链对主体访问行为的诚信预测算法如下:The honesty prediction algorithm of applying the Markov chain to the subject's access behavior is as follows:
(1)对主体给出所有可能的m个访问反馈评价等级,组成马尔可夫链的状态空间。(1) All possible m access feedback evaluation levels are given to the subject to form the state space of the Markov chain.
(2)读取主体的访问记录表,如果访问记录表为空,则说明该主体首次访问,则对主体的访问反馈评价等级预测初始为Ki,算法结束;否则,读取访问记录表,并读取相关客体的访问评价表,构建当前访问反馈评价状态表。(2) Read the subject's visit record table, if the visit record table is empty, it means that the subject visits for the first time, then the subject's visit feedback evaluation level prediction is initially K i , The algorithm ends; otherwise, read the access record table and the access evaluation table of related objects, and construct the current access feedback evaluation status table.
(3)根据主体当前最新访问反馈评价状态表,统计出每个访问反馈评价等级的概率分布,即访问反馈评价状态的初始分布;(3) According to the subject's current latest access feedback evaluation status table, calculate the probability distribution of each access feedback evaluation level, that is, the initial distribution of the access feedback evaluation status;
假设对当前ti时刻,访问反馈评价状态表中有n个记录,统计访问反馈评价等级为Ki的记录数为Ui,那么访问反馈评价等级为Ki的概率pi=Ui/n,当前ti时刻的评价状态初始分布为P(0)=(pi),其中,i=0,1,...,m-1。Assuming that at the current time t i , there are n records in the access feedback evaluation state table, and the number of records whose access feedback evaluation level is K i is U i , then the probability of access feedback evaluation level K i is p i = U i /n , the initial distribution of evaluation states at the current time t i is P(0)=(p i ), where i=0,1,...,m-1.
(4)对于主体当前访问反馈评价状态表中每个客体,通过查找它的客体评价表,得到上次对该主体给出的访问反馈评价等级,构成前一时刻的反馈评价状态表,将其与当前访问反馈评价状态表进行对比,统计每个访问反馈评价等级向其余的访问反馈评价等级的转变概率,建立状态转移矩阵。(4) For each object in the subject’s current access feedback evaluation state table, by looking up its object evaluation table, the last access feedback evaluation level given to the subject is obtained, and the feedback evaluation state table at the previous moment is formed. Compared with the current access feedback evaluation state table, the transition probability of each access feedback evaluation level to the rest of the access feedback evaluation levels is calculated, and a state transition matrix is established.
如果主体对客体仅仅访问过一次,则无法通过查找客体评价表得到主体的上次访问反馈评价等级。针对这种情况,本发明采用访问反馈评价等级初始化的方法,即将该主体的上次访问反馈评价等级设为Ki, If the subject has only visited the object once, the feedback evaluation level of the subject's last visit cannot be obtained by looking up the object evaluation table. In view of this situation, the present invention adopts the method of initializing the evaluation level of the access feedback, that is, the last access feedback evaluation level of the subject is set to K i ,
假设前一时刻访问反馈评价状态表中,给出访问反馈评价等级为Ki的客体数为Mi,并且客体的IP分别为IP_0,IP_1,…,IP_(Mi-1)。如果对访问反馈评价等级Ki的客体数Mi=0,即表示无客体给出该评价等级,那么pi=0;否则,对于该Mi个客体,统计当前时刻给出访问反馈评价等级为Kj的客体数为Cj,其中,j=0,1,...,m-1,那么pij=Cj/Mi,i,j=0,1,...,m-1。pij表示由于主体访问诚信行为的改变,给出访问反馈评价等级Ki的客体,转移至当前访问反馈评价等级Kj的概率。Pij=(pij)m×m为这n个客体对主体访问反馈评价状态的转移矩阵。Assume that in the access feedback evaluation status table at the previous moment, the number of objects whose access feedback evaluation level is given as K i is M i , and The IPs of the objects are respectively IP_0, IP_1, . . . , IP_(M i -1). If the number of objects M i =0 for the access feedback evaluation level Ki = 0, it means that there is no object to give the evaluation level, then p i =0; The number of objects for K j is C j , where j=0,1,...,m-1, then p ij =C j /M i , i,j=0,1,...,m- 1. p ij represents the probability that the object given access feedback evaluation level K i will transfer to the current access feedback evaluation level K j due to the change of subject’s access integrity behavior. P ij =(p ij ) m×m is the transition matrix of the n objects to the subject's access feedback evaluation state.
(5)由访问反馈评价状态的初始分布P(0)和状态转移矩阵P,预测主体下一时刻访问反馈评价状态的绝对概率分布:PT(1)=PT(0)·P;(5) Based on the initial distribution P(0) of the access feedback evaluation state and the state transition matrix P, predict the absolute probability distribution of the subject’s access feedback evaluation state at the next moment: PT (1)= PT (0)·P;
(6)根据预测的访问反馈评价状态绝对概率分布,按照最大概率原则,确定主体的访问反馈评价等级,即对主体下一步访问行为的诚信度进行预测。(6) According to the absolute probability distribution of the predicted access feedback evaluation status, and according to the principle of maximum probability, determine the subject's access feedback evaluation level, that is, predict the integrity of the subject's next access behavior.
六、访问权限管理6. Access rights management
根据最大隶属度原则,B=max(PT(1)),根据表1可知,预测主体下一步的访问反馈评价等级是Ki。根据权限管理规则,若权限所要求预测的访问反馈评价等级集合为R={Kj,...,Km-1},j=0,1,...m-1,那么当Ki∈R时,主体的访问被许可;否则,访问被拒绝。According to the principle of maximum membership degree, B=max(P T (1)), according to Table 1, it can be known that the next visit feedback evaluation level of the predictor is K i . According to the authority management rules, if the set of access feedback evaluation levels required by authority prediction is R={K j ,...,K m-1 }, j=0,1,...m-1, then when K i When ∈R, the subject's access is allowed; otherwise, the access is denied.
与现有技术相比,本发明具有以下优点:Compared with the prior art, the present invention has the following advantages:
本方法引入访问反馈评价机制,通过对历史访问反馈数据应用马尔可夫模型,实现了对主体访问诚信度的“宏观”预测,并依据该诚信度,直观判定访问权限的授予与拒绝。本方法可以有效地避免访问欺诈风险,实现访问控制权限的安全管理。This method introduces the access feedback evaluation mechanism. By applying the Markov model to the historical access feedback data, the "macroscopic" prediction of the subject's access integrity is realized, and based on the integrity, the granting and rejection of access rights are intuitively judged. The method can effectively avoid the risk of access fraud and realize the security management of access control rights.
附图说明Description of drawings
附图为本发明的流程图。Accompanying drawing is the flowchart of the present invention.
具体实施方式Detailed ways
下面通过具体实施方式,对本发明进行详细说明。The present invention will be described in detail below through specific embodiments.
具体应用实例:Specific application examples:
(1)访问反馈评价等级及其反馈满意度,如表3所示。(1) Access feedback evaluation grade and feedback satisfaction, as shown in Table 3.
表3访问反馈满意度隶属的评价等级Table 3 Evaluation grades of interview feedback satisfaction
客体Object有{读},{写}和{修改}三个可授予的访问权限,这三个权限对主体的预测访问评价等级的集合要求分别是:{非欺诈,诚信},{诚信},{诚信}。The object Object has three grantable access rights: {read}, {write} and {modify}. The set requirements of these three permissions on the predictive access evaluation level of the subject are: {non-fraud, integrity}, {integrity}, {integrity}.
假设主体Subject对Object访问请求为{修改},Object的响应过程如下:Assuming that the Subject’s access request to the Object is {modify}, the response process of the Object is as follows:
(2)通过对Subject访问记录表和相关客体评价表的查询,构建当前访问反馈评价状态表和前一时刻访问反馈评价状态表,如表4和表5所示。(2) By querying the Subject visit record table and the related object evaluation table, construct the current visit feedback evaluation status table and the previous visit feedback evaluation status table, as shown in Table 4 and Table 5.
由对表4的统计可知,PT(0)=[0.2,0.2,0.6]According to the statistics of Table 4, P T (0)=[0.2,0.2,0.6]
由表4和表5的对比分析可知,
表4当前访问反馈评价状态表Table 4 Current Visit Feedback Evaluation Status Table
表5前一时刻访问反馈评价状态表Table 5 Feedback and Evaluation Status Table of Visiting at the Previous Moment
(3)求取评价状态绝对概率分布(3) Obtain the absolute probability distribution of the evaluation state
(4)访问权限管理(4) Access rights management
根据最大隶属度原则,B=max(PT(1))=0.6∈[0.5,0.7),由表3可知,主体Subject下一步访问反馈评价等级为:非欺诈{诚信},故{修改}访问请求被拒绝。According to the principle of maximum membership degree, B=max(P T (1))=0.6∈[0.5,0.7), it can be seen from Table 3 that the evaluation level of Subject’s next visit feedback is: non-fraud {Integrity}, therefore {Modify} access request is denied.
Claims (7)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201510145813.4A CN104811442A (en) | 2015-03-30 | 2015-03-30 | Access control method based on feedback evaluation mechanism |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201510145813.4A CN104811442A (en) | 2015-03-30 | 2015-03-30 | Access control method based on feedback evaluation mechanism |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN104811442A true CN104811442A (en) | 2015-07-29 |
Family
ID=53695936
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201510145813.4A Pending CN104811442A (en) | 2015-03-30 | 2015-03-30 | Access control method based on feedback evaluation mechanism |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN104811442A (en) |
Cited By (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN111343173A (en) * | 2020-02-21 | 2020-06-26 | 腾讯云计算(北京)有限责任公司 | Data access abnormity monitoring method and device |
| CN116527320A (en) * | 2023-03-30 | 2023-08-01 | 南京南瑞信息通信科技有限公司 | Trusted access behavior forced access control method, device, medium and equipment |
| CN118536165A (en) * | 2024-07-26 | 2024-08-23 | 大连东启智能科技有限公司 | A secure sharing method of performance appraisal data for power grid human resource system |
Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20090024629A1 (en) * | 2007-07-17 | 2009-01-22 | Koji Miyauchi | Access control device and method thereof |
| CN103532967A (en) * | 2013-10-23 | 2014-01-22 | 北京工业大学 | Trust quantification method based on subject access behavior |
-
2015
- 2015-03-30 CN CN201510145813.4A patent/CN104811442A/en active Pending
Patent Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20090024629A1 (en) * | 2007-07-17 | 2009-01-22 | Koji Miyauchi | Access control device and method thereof |
| CN103532967A (en) * | 2013-10-23 | 2014-01-22 | 北京工业大学 | Trust quantification method based on subject access behavior |
Non-Patent Citations (1)
| Title |
|---|
| 马书南: "《网络环境中基于信任的访问控制模型与方法研究》", 《北京工业大学工学博士学位论文》 * |
Cited By (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN111343173A (en) * | 2020-02-21 | 2020-06-26 | 腾讯云计算(北京)有限责任公司 | Data access abnormity monitoring method and device |
| CN111343173B (en) * | 2020-02-21 | 2022-08-26 | 腾讯云计算(北京)有限责任公司 | Data access abnormity monitoring method and device |
| CN116527320A (en) * | 2023-03-30 | 2023-08-01 | 南京南瑞信息通信科技有限公司 | Trusted access behavior forced access control method, device, medium and equipment |
| CN118536165A (en) * | 2024-07-26 | 2024-08-23 | 大连东启智能科技有限公司 | A secure sharing method of performance appraisal data for power grid human resource system |
| CN118536165B (en) * | 2024-07-26 | 2024-09-24 | 大连东启智能科技有限公司 | A secure sharing method of performance appraisal data for power grid human resource system |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN109408734B (en) | A collaborative filtering recommendation method integrating information entropy similarity and dynamic trust | |
| Waltman et al. | The inconsistency of the h‐index | |
| CN116633615A (en) | An Access Control Method Based on Blockchain and Risk Assessment | |
| CN109992982A (en) | Big data access authorization method, device and big data platform | |
| CN103530106B (en) | Method and system of context-dependent transactional management for separation of duties | |
| CN108427891A (en) | Neighborhood based on difference secret protection recommends method | |
| CN113342418B (en) | Blockchain-based Distributed Machine Learning Task Offloading Method | |
| CN104735055A (en) | Cross-domain security access control method based on credibility | |
| CN118643509B (en) | Scenario-adaptive permission dynamic adjustment method and device based on trust evaluation | |
| CN104780159A (en) | Access control method based on dynamic trust thresholds | |
| CN119652551A (en) | A user information management method and system based on application information | |
| CN104811442A (en) | Access control method based on feedback evaluation mechanism | |
| CN105262719A (en) | Credit evaluation method of user behavior in Web environment | |
| Sun | Research on the tradeoff between privacy and trust in cloud computing | |
| CN116346432A (en) | Access control system, electronic equipment and storage medium of energy industry internet | |
| Cai et al. | Distributed management of permission for access control model | |
| Jing et al. | Geohash coding location privacy protection scheme based on entropy weight TOPSIS | |
| CN104392373A (en) | Interactive decision-making method based on key historical behaviors in cloud computing environment | |
| US20240420231A1 (en) | Techniques for automatically controlling access to secured resources | |
| KR102345748B1 (en) | Method and system for providing data compliance | |
| Wang et al. | A cloud service recommendation method based on extended multi‐source information fusion | |
| Wang et al. | Blockchain-based multidimensional trust management in edge computing | |
| KR20210152824A (en) | Data evaluation management method for providing data compliance and system thereof | |
| Yang et al. | Research on way of evaluating cloud end user behavior's credibility based on the methodology of multilevel fuzzy comprehensive evaluation | |
| KR102345750B1 (en) | Method and system for analysing data de-identification risk |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| EXSB | Decision made by sipo to initiate substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| WD01 | Invention patent application deemed withdrawn after publication | ||
| WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20150729 |