计算机科学与探索 ›› 2013, Vol. 7 ›› Issue (3): 193-208.DOI: 10.3778/j.issn.1673-9418.1208037

• 学术研究 • 上一篇    下一篇

主动模糊访问控制规则集终止性分析

窦文阳+,王小明,张立臣   

  1. 陕西师范大学 计算机科学学院,西安 710062
  • 出版日期:2013-03-01 发布日期:2013-03-05

Termination Analysis for Active Fuzzy Access Control Rules Set

DOU Wenyang+, WANG Xiaoming, ZHANG Lichen   

  1. School of Computer Science, Shaanxi Normal University, Xi’an 710062, China
  • Online:2013-03-01 Published:2013-03-05

摘要: 基于主动模糊规则的访问控制模型,可以实现普适计算环境下资源的安全主动模糊自适应访问控制,而构造的访问控制规则集的终止性是决定模型实际是否可用的一个关键问题。提出了一种基于元图理论的主动模糊访问控制规则集终止性分析方法,用模糊触发元图(fuzzy triggering metagraphs,FTMG)表示主动模糊访问控制规则之间复杂的触发和激活关系,通过分析FTMG的邻接矩阵闭包,寻找最小真触发环,进而判断主动模糊访问控制规则集的终止性。通过实例分析验证了该方法的有效性和可用性,仿真实验结果表明,使用该方法分析大规模主动模糊规则集终止性时具有较高的时间效率。

关键词: 普适计算, 主动访问控制, 主动模糊规则, 终止性分析, 模糊授权

Abstract: Access control model based on active fuzzy rule can achieve fuzzy adaptive control to the resources in ubiquitous computing environment. However, how to judge the termination of access control rules set is a key issue to determine whether the access control model is available. This paper proposes a termination analysis method based on metagraphs theory for active fuzzy access control rules set. It presents fuzzy triggering metagraphs (FTMG) to represent the triggering and activation relations between active fuzzy rules, and detects the minimum true triggering cycle by analyzing FTMG adjacency matrix closure for determining the termination of active fuzzy access control rules set. Finally, a prototype system shows that the method is valid, and the simulation results show that the method is efficient in the analysis of large rules set.

Key words: ubiquitous computing, active access control, active fuzzy rule, termination analysis, fuzzy authorization