z-logo
open-access-imgOpen Access
MODEL OF ADAPTIVE ACCESS RIGHTS MANAGEMENT USING PETRI NETS
Author(s) -
Valeriy Lakhno,
Victor Smolii,
Andrii Blozva,
Dmytro Kasatkin,
Tetiana Osypova,
Maksym Misiura
Publication year - 2022
Publication title -
kìberbezpeka. osvìta, nauka, tehnìka
Language(s) - English
Resource type - Journals
ISSN - 2663-4023
DOI - 10.28925/2663-4023.2022.15.135147
Subject(s) - petri net , computer science , notation , access control , access management , state (computer science) , distributed computing , computer security , programming language , computer network , arithmetic , mathematics
The article describes the conceptual model of adaptive management of cybersecurity of the information and educational environment of a modern university (IOSU). Petri nets are used as a mathematical apparatus to solve the problem of adaptive management of access rights of IOS users. A simulation model is proposed and modeling in PIPE v4.3.0 package is performed. The possibility of automating the procedures of user profile adjustment to minimize or neutralize cyber threats in IOS is shown. The model of distribution of tasks of the user in computer networks of IOSU is offered. The model, in contrast to the existing ones, is based on the mathematical apparatus of Petri nets and contains variables that reduce the power of the state space. The method of access control (ICPD) has been supplemented. The additions addressed aspects of the verification of access rights, which are required by the tasks and requirements of the security policy, the degree of coherence of tasks and allowed access to the IOSU nodes. Adjusting security rules and metrics for new tasks or reallocating tasks is described in Petri net notation.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here