Font Size: a A A

Research And Implementation Of Permissions Risk Based On Simulation Technology

Posted on:2013-11-15Degree:MasterType:Thesis
Country:ChinaCandidate:Y C YangFull Text:PDF
GTID:2248330377459117Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the development of computer and network technology, the digital office is widelyused in the government and enterprise, information security has been more attention becauseof information leakage incidents occurred. For the security of internal network and externalnetwork, many companies have developed products to protect against leakage of informationsecurity. Most leakages caused by imperfect access control policy, therefore, many peopleconduct research about permissions leakage in access control policy and gives testingprogram of implicit permission. However, this static detection method can’t adapt dynamicsof permission rules in information systems.This paper points out the essence of permission risk occurred, through the research ofaccess control policy, propose mechanism of permission risk detection based on simulationtechnology.Firstly, analysis and research key technologies that simulation of permission riskdetection required, propose program of permission risk detection according to the principle.Secondly, based on the analysis of the program, introduced the access control policy intothe workflow model as authorization mechanisms, according to initiate from user of theaccess control policy in real system, propose that introduce agent into workflow simulation,and analyze the theory of permission risk detection based on simulation, propose detectionprogram of permissions risk for the principles of permissions risk arising.Finally, design the rule of permission risk detection and engine of permission riskdetection, given the program implementation about business modeling, permission simulationand permission risk detection.
Keywords/Search Tags:Permissions risk, Access Control, Workflow Simulation, Multi-AgentCollaboration
PDF Full Text Request
Related items