期刊文献+

基于π演算的云服务安全检测

Detecting Security in Cloud Services Based on π-Calculus
下载PDF
导出
摘要 利用π演算对云服务流程进行形式化描述,基于描述结果给出一种针对用户越权访问和服务不完整两种安全性问题的检测方法.基于云环境下的虚拟机部署实例对该方法的流程进行了说明,并将该方法与Bayes网和预测规则集等安全检测方法进行对比.结果表明,该方法能同时保证云服务过程的一致性和安全性. Theπ-calculus was used to describe the process of the cloud services.Based on the description,the methods of detecting the two problems of the users' unauthorized access and integrity verification was proposed.The process of the method can be described by the deploying of the virtual machines in the cloud,and the proposed method was compared with the security detection methods such as the Bayesian network,the prediction rule set and so on.The results show that the proposed method can simultaneously ensure the consistency and the security of cloud service process.
出处 《吉林大学学报(理学版)》 CAS CSCD 北大核心 2014年第3期503-508,共6页 Journal of Jilin University:Science Edition
基金 国家自然科学基金(批准号:61300049) 教育部高等学校博士学科点专项基金(批准号:20120061120059) 吉林省科技发展计划项目(批准号:20130206052GX 20140520069JH)
关键词 云服务 Π演算 越权访问 完整性 cloud service π-calculus unauthorized access integrity
  • 相关文献

参考文献12

  • 1Ryan M D. Cloud Computing Scurity:The Scicntific Challenge, and a Survey of Solutions [J]. Journal of Systems and Software,2013,86(9): 2263-2268.
  • 2杨智君,田地,马骏骁,隋欣,周斌.入侵检测技术研究综述[J].计算机工程与设计,2006,27(12):2119-2123. 被引量:45
  • 3Krucgcl C,Mutz D,Robertson W,et al. Bayesian Event Classification for Intrusion Dctcction [C]//Proc of the 19th Annual Computer Security Applications ConfcrcnccC ACS AC). Washington DC: IEEE Computer Socicty,2003 :14-23.
  • 4Tcng H S,Chen K,Lu SC Y. Security Audit Trail Analysis Using Inductively Generated Prcdictivc Rules [C].// Proceeding of the Sixth Confcrcncc on Artificial Intelligence Applications. Washington DC: m Computer Socicty,1990: 24-29.
  • 5Lane T,Brodlcy C E Temporal Scqucncc Learning and Data Reduction for Anomaly Dctcction [J]. ACM Transactions on Information and System Security,1999,2(3) : 295-331.
  • 6Lee W,Stolfo S J,Chan P K,et al. Real Time Data Mining-Based Intrusion Dctcction [C]//Proceedings of 2nd DARPA Information Survivability Confcrcncc and Exposition (DIsCE'X). Washington DC: m Computer Socicty,2001: 89-100.
  • 7Sailer R,Zhang X,Jaeger T,ct al. Design and lmplcmcntation of a TCG~Based Integrity Measurement Architcclurc [C]//Proc of the 13rd USENIX Security Symposium. Berkeley: USENIX Association,2004: 223-238.
  • 8Clark D D,Wilson D R.A Comparison of Commercial and Military Computer Security Policies [C]//Proc of the 1987 EEE Symp on Security and Privacy. Washington DC: IEEE Computer Socicty,1987: 184-194.
  • 9蒋建春,马恒太,任党恩,卿斯汉.网络安全入侵检测:研究综述[J].软件学报,2000,11(11):1460-1466. 被引量:370
  • 10Milner R. Comm uni eating and Mo bile Systems: Thc Pi-Calculus [M]. Cambridge: Cam bridge University Press,1999: 77-159.

二级参考文献52

  • 1Liu Meilan,Information and Communication Security CCICS’99.First Chinese Conference Inform,2000年,105页
  • 2刘美兰,信息和通信安全CCICS’99:第1届中国信息和通信安全学术会议论文集,2000年,105页
  • 3Chen S,Internet draftdraft- ietf- cidf- data- formats- 0 0 .txt,1998年
  • 4Bian Zhaoqi,Pattern Recognition,1988年
  • 5边肇祺,模式识别,1988年
  • 6何华灿,人工智能导论,1988年
  • 7Denning D E,IEEE Trans Software Eng,1987年,13卷,2期,222页
  • 8Koehler J., Srivastava B. Web service composition: Current solutions and open problems. In: Proceedings of the 13th International Conference on Automated Planning & Scheduling, Trento, Italy, 2003, 28~35
  • 9Milner R. Communication and Concurrency. Englewood Cliffs: Prentice -Hall, 1989
  • 10Fensel D. The semantic web and its languages. IEEE Intelligent Systems, 2000, 15(6): 67~73

共引文献519

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部