Font Size: a A A

Research On The Application Of The DNA Computation In The Queries And Security Analysis Of Access Control

Posted on:2012-12-21Degree:MasterType:Thesis
Country:ChinaCandidate:Y JiangFull Text:PDF
GTID:2248330395485525Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
In1994, Dr. Adleman firstly proposed the concept of DNA computing, withwhich he resolved7-nodes instance of Hamiltonian Path Problem, showing itstremendously paralleled computing capacity when apply DNA computing to solve NPcomplete problem. In recent years, access control model has gained more and moreattention in the field of computer security. But in some key areas such as UserAuthorization Query, Possible Security Analysis, there exists some difficult NPcomplete problems. DNA computing is believed as an effectively potential solution tothese difficult problems above, due to its huge storage and ability of parallelcomputing compared with traditional computer.Access control is a method which restricts user’s access capabilities bydelomorphic ways. Compared to the traditional Mandatory Access Control andDiscretionary Access Control, role-based access control has many advantages, whichis an access control mechanism associated permission with role, and provides greaterflexibility and scalability.The purpose of this paper was to apply DNA computing to solve UserAuthorization Queries and Security Analysis in the role-based access control model.DNA computing algorithms were designed to solve the above two NP completeproblems, which were proved to be feasible in theory. Firstly, mapping from accesscontrol model to DNA computing model was established, which represented ementsand operations on them of RBAC model appropriately by DNA chains; Secondly, aDNA computing algorithm was designed to resolve User Authorization Queries inRBAC; Finally, another DNA computing algorithm was brought forward to sovleRecycling-based Possible Security Query problem in RBAC. Both DNA algorithmsaboved is polynomial time with the size of problem’s input.This paper extended the scope of DNA computing’s application, and solved somedifficult key problems in the role-based access control model in theory. As long asbiotechnology of DNA computing become mature enough, the DNA computing canplay a bigger role in the future.
Keywords/Search Tags:DNA Computing, Role-based Access Control, User Authorization Queries, Possible Security Query, NP Complete Problem
PDF Full Text Request
Related items