首页> 外文期刊>Computers & Security >Evaluating and comparing the quality of access control in different operating systems
【24h】

Evaluating and comparing the quality of access control in different operating systems

机译:评估和比较不同操作系统中访问控制的质量

获取原文
获取原文并翻译 | 示例
           

摘要

Access control mechanisms (ACMs) have been widely used by operating systems (OSes) to protect information security. However, it is often challenging to evaluate and compare the quality of protection (QoP) of ACMs, especially when they are deployed on different OS platforms. This article presents an approach to quantitatively measure and compare the quality of ACMs, which provides useful information to support OS administrators and users to choose ACMs that fit with their security needs. We introduce the notion of vulnerability profiles to capture the weakness of ACMs in protecting against malicious attacks, based on which vulnerability coefficients are computed as the numeric and platform-independent measurement of the QoP of ACMs. The approach combines the grey system theory and an independent vulnerability scoring system to infer complete vulnerability profiles and to calculate fair and objective vulnerability coefficients for ACMs. We implement a prototype called ACVAL based on the approach, and apply it to four mainstream ACMs. The results show that ACVAL is effective in evaluating and comparing ACMs across different OSes, a feature particularly useful to administrators of heterogeneous IT systems. To the best of our knowledge, our approach is the first to quantitative measurement and comparison of ACMs across OSes.
机译:访问控制机制(ACM)已被操作系统(OSes)广泛用于保护信息安全。但是,评估和比较ACM的保护质量(QoP)常常具有挑战性,尤其是当它们在不同的OS平台上部署时。本文介绍了一种定量测量和比较ACM质量的方法,该方法提供了有用的信息来支持OS管理员和用户选择适合其安全需求的ACM。我们引入了漏洞概要文件的概念,以捕获ACM在防御恶意攻击方面的弱点,基于此漏洞系数是作为ACM QoP的数值和平台独立性度量来计算的。该方法结合了灰色系统理论和独立的漏洞评分系统,可以推断出完整的漏洞概况并计算ACM的公正和客观的漏洞系数。我们基于该方法实现了一个称为ACVAL的原型,并将其应用于四个主流ACM。结果表明,ACVAL可有效评估和比较不同OS上的ACM,此功能对异构IT系统的管理员特别有用。据我们所知,我们的方法是第一个对跨操作系统的ACM进行定量测量和比较的方法。

著录项

  • 来源
    《Computers & Security》 |2014年第11期|26-40|共15页
  • 作者单位

    Trusted Computing and Information Assurance Laboratory, Institute of Software, Chinese Academy of Sciences,China,Rm809 Bldg 5, 4# South Fourth Street, Zhongguancun, Beijing 100190, China;

    Trusted Computing and Information Assurance Laboratory, Institute of Software, Chinese Academy of Sciences,China;

    Trusted Computing and Information Assurance Laboratory, Institute of Software, Chinese Academy of Sciences,China;

    Trusted Computing and Information Assurance Laboratory, Institute of Software, Chinese Academy of Sciences,China;

    Trusted Computing and Information Assurance Laboratory, Institute of Software, Chinese Academy of Sciences,China;

    Trusted Computing and Information Assurance Laboratory, Institute of Software, Chinese Academy of Sciences,China;

  • 收录信息 美国《科学引文索引》(SCI);美国《工程索引》(EI);
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    Security measurement; Vulnerability profile; Attack surface; Access control; Operating system; Logic programming;

    机译:安全测量;漏洞概况;攻击面;访问控制;操作系统;逻辑程序设计;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号