Skip to main content

Genetic Optimization of Access Control Schemes in Virtual Local Area Networks

  • Conference paper
Computer Network Security (MMM-ACNS 2010)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 6258))

Abstract

The paper presents the formulation of the problem of access control to information resources located in virtual local area networks. We define the initial data, the objective function and constraints of the problem. To solve the proposed problem we suggest the method of genetic optimization of access control scheme based on the poly-chromosomal representation of intermediate points. The results of computer simulation and evaluation of the proposed method are discussed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bubnov, R.V., Chernikov, A.S.: Basic principles of security in an integrated information system to support the management of the University. Vestnik MSTU Bauman, No.2 (2004) (in Russian)

    Google Scholar 

  2. Simonenko, S.N.: Review of discretionary access control mechanisms in relation to information systems, http://www.philippovich.ru/Library/Books/ITS/wwwbook/IST7/simonenko/Simonenko.htm#_ftn1 (in Russian)

  3. Lampson, B.W.: Protection. In: Proceedings of the 5th Princeton Conference on Information Sciences and Systems (1971)

    Google Scholar 

  4. Bishop, M.: Computer Security: art and science. Pearson Education, Inc., Boston (2002)

    Google Scholar 

  5. Kizza, J.M.: Computer Network Security. Springer Science+Business Media, Inc., New York (2005)

    MATH  Google Scholar 

  6. Galatenko, V.A.: Identification and authentication, access control, http://www.citforum.ru/security/articles/galatenko (in Russian)

  7. Gyikovich, V.Y.: Fundamentals of Information Technology Security, http://bezpeka.ladimir.kiev.ua/pq/show/zi.htm (in Russian)

  8. Hildebrandt, W.: Security at all levels. LAN 11 (2004) (in Russian)

    Google Scholar 

  9. Research Report: Secure Use of VLANs: An @stake Security Assessment (2002)

    Google Scholar 

  10. The main protective mechanisms used in systems to protect information, http://asher.ru/security/book/its/07 (in Russian)

  11. How To Design an Access Control Matrix for Your Organization, http://www.howtodothings.com/business/how-to-design-an-access-control-matrix-for-your-organization

  12. Wang, G., Dexter, T.W., Punch, V.F., Goodman, E.D.: Optimization of GA and Within a GA for a 2-Dimensional Layout Problem. In: First International Conference on Evolutionary Computation and Its Application (1996)

    Google Scholar 

  13. Shaffer, J.D., Eshelman, L.J.: Combinatorial Optimization by Genetic Algorithms: The Value of the Genotype/Phenotype Distinction. In: First International Conference on Evolutionary Computation and Its Application (1996)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Saenko, I., Kotenko, I. (2010). Genetic Optimization of Access Control Schemes in Virtual Local Area Networks. In: Kotenko, I., Skormin, V. (eds) Computer Network Security. MMM-ACNS 2010. Lecture Notes in Computer Science, vol 6258. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14706-7_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-14706-7_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-14705-0

  • Online ISBN: 978-3-642-14706-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics