基于服务组合的信息系统动态行为安全评价

DanChen Wang, Yang Xu, Peng Xu
{"title":"基于服务组合的信息系统动态行为安全评价","authors":"DanChen Wang, Yang Xu, Peng Xu","doi":"10.1109/ISKE.2015.71","DOIUrl":null,"url":null,"abstract":"In the complex network environment, system service is dynamically adjusted according to the changes of user behavior and computing environment. Also, security strategy tends to be more dynamic based on the work flow, which will bring new challenges to the security evaluation of system operation. Therefore, this paper aims to regard the service composition business as research object, focusing on the analysis of security equipment's character that deployed by the system, abstracting the behavior of security service, classifying it to the business service, and systematically solving the security evaluation problems in business operation. Meanwhile, user behavior pattern is established on the cloud-model theory, and fully studied in the premise of ensuring the structural accuracy of work flow. Then, by analyzing the credibility of user behavior, the utility function is defined from the relation between threat and protection, and the security service efficiency identified by the change operation set of security service. Furthermore, a guaranteeing method is raised to the rational reconstruction by a security component, which produces an adequate redundant path of component service according to the existing executive record and logical structure, so as to reach the goal of ensuring the operation security of system business.","PeriodicalId":312629,"journal":{"name":"2015 10th International Conference on Intelligent Systems and Knowledge Engineering (ISKE)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Information System's Security Evaluation of Dynamic Behavior Based on Service Composition\",\"authors\":\"DanChen Wang, Yang Xu, Peng Xu\",\"doi\":\"10.1109/ISKE.2015.71\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In the complex network environment, system service is dynamically adjusted according to the changes of user behavior and computing environment. Also, security strategy tends to be more dynamic based on the work flow, which will bring new challenges to the security evaluation of system operation. Therefore, this paper aims to regard the service composition business as research object, focusing on the analysis of security equipment's character that deployed by the system, abstracting the behavior of security service, classifying it to the business service, and systematically solving the security evaluation problems in business operation. Meanwhile, user behavior pattern is established on the cloud-model theory, and fully studied in the premise of ensuring the structural accuracy of work flow. Then, by analyzing the credibility of user behavior, the utility function is defined from the relation between threat and protection, and the security service efficiency identified by the change operation set of security service. Furthermore, a guaranteeing method is raised to the rational reconstruction by a security component, which produces an adequate redundant path of component service according to the existing executive record and logical structure, so as to reach the goal of ensuring the operation security of system business.\",\"PeriodicalId\":312629,\"journal\":{\"name\":\"2015 10th International Conference on Intelligent Systems and Knowledge Engineering (ISKE)\",\"volume\":\"59 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 10th International Conference on Intelligent Systems and Knowledge Engineering (ISKE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISKE.2015.71\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 10th International Conference on Intelligent Systems and Knowledge Engineering (ISKE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISKE.2015.71","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

在复杂的网络环境中,系统服务是根据用户行为和计算环境的变化动态调整的。同时,安全策略也趋向于基于工作流的动态性,这给系统运行的安全评估带来了新的挑战。因此,本文旨在以服务组合业务为研究对象,重点分析系统部署的安全设备的特性,将安全服务行为抽象为业务服务,并将其分类为业务服务,系统地解决业务运行中的安全评价问题。同时,基于云模型理论建立用户行为模式,在保证工作流结构准确性的前提下,对用户行为模式进行充分研究。然后,通过分析用户行为的可信度,从威胁与保护的关系中定义效用函数,通过安全服务的变更操作集识别安全服务效率。提出了一种由安全组件进行合理重构的保证方法,根据现有的执行记录和逻辑结构,生成适当的组件服务冗余路径,从而达到保证系统业务运行安全的目的。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Information System's Security Evaluation of Dynamic Behavior Based on Service Composition
In the complex network environment, system service is dynamically adjusted according to the changes of user behavior and computing environment. Also, security strategy tends to be more dynamic based on the work flow, which will bring new challenges to the security evaluation of system operation. Therefore, this paper aims to regard the service composition business as research object, focusing on the analysis of security equipment's character that deployed by the system, abstracting the behavior of security service, classifying it to the business service, and systematically solving the security evaluation problems in business operation. Meanwhile, user behavior pattern is established on the cloud-model theory, and fully studied in the premise of ensuring the structural accuracy of work flow. Then, by analyzing the credibility of user behavior, the utility function is defined from the relation between threat and protection, and the security service efficiency identified by the change operation set of security service. Furthermore, a guaranteeing method is raised to the rational reconstruction by a security component, which produces an adequate redundant path of component service according to the existing executive record and logical structure, so as to reach the goal of ensuring the operation security of system business.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信