首页 | 本学科首页   官方微博 | 高级检索  
     

Intelligent Security Auditing Based on Access Control of Devices in Ad Hoc Network
引用本文:徐光伟 史有群 朱明 吴国文 曹奇英. Intelligent Security Auditing Based on Access Control of Devices in Ad Hoc Network[J]. 东华大学学报(英文版), 2006, 23(6): 50-52
作者姓名:徐光伟 史有群 朱明 吴国文 曹奇英
作者单位:[1]Department of Computer Science and Technology, Donghua University , Shanghai 201620 [2]Post Doctor Station of Management Science and Engineering, Tongji University, Shanghai 200092
摘    要:Security in Ad Hoc network is an important issue under the opening circumstance of application service. Some protocols and models of security auditing have been proposed to ensure rationality of contracting strategy and operating regulation and used to identify abnormal operation. Model of security auditing based on access control of devices will be advanced to register sign of devices and property of event of access control and to audit those actions. In the end, the model is analyzed and simulated.

关 键 词:安全技术 智能安全控制系统 网络技术 对等网络
收稿时间:2006-08-20

Intelligent Security Auditing Based on Access Control of Devices in Ad Hoc Network
XU Guang-wei,SHI You-qun,ZHU Ming,WU Guo-wen,CAO Qi-ying. Intelligent Security Auditing Based on Access Control of Devices in Ad Hoc Network[J]. Journal of Donghua University, 2006, 23(6): 50-52
Authors:XU Guang-wei  SHI You-qun  ZHU Ming  WU Guo-wen  CAO Qi-ying
Affiliation:1. Department of Computer Science and Technology, Donghua University , Shanghai 201620;Post Doctor Station of Management Science and Engineering, Tongji University, Shanghai 200092
2. Department of Computer Science and Technology, Donghua University , Shanghai 201620
Abstract:Security in Ad Hoc network is an important issue under the opening circumstance of application service. Some protocols and models of security auditing have been proposed to ensure rationality of contracting strategy and operating regulation and used to identify abnormal operation. Model of security auditing based on access control of devices will be advanced to register sign of devices and property of event of access control and to audit those actions. In the end, the model is analyzed and simulated.
Keywords:Ad Hoc  security auditing  access control of devices  sign of devices  property of event
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号