Abstract
The paper presents the formulation of the problem of access control to information resources located in virtual local area networks. We define the initial data, the objective function and constraints of the problem. To solve the proposed problem we suggest the method of genetic optimization of access control scheme based on the poly-chromosomal representation of intermediate points. The results of computer simulation and evaluation of the proposed method are discussed.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
References
Bubnov, R.V., Chernikov, A.S.: Basic principles of security in an integrated information system to support the management of the University. Vestnik MSTU Bauman, No.2 (2004) (in Russian)
Simonenko, S.N.: Review of discretionary access control mechanisms in relation to information systems, http://www.philippovich.ru/Library/Books/ITS/wwwbook/IST7/simonenko/Simonenko.htm#_ftn1 (in Russian)
Lampson, B.W.: Protection. In: Proceedings of the 5th Princeton Conference on Information Sciences and Systems (1971)
Bishop, M.: Computer Security: art and science. Pearson Education, Inc., Boston (2002)
Kizza, J.M.: Computer Network Security. Springer Science+Business Media, Inc., New York (2005)
Galatenko, V.A.: Identification and authentication, access control, http://www.citforum.ru/security/articles/galatenko (in Russian)
Gyikovich, V.Y.: Fundamentals of Information Technology Security, http://bezpeka.ladimir.kiev.ua/pq/show/zi.htm (in Russian)
Hildebrandt, W.: Security at all levels. LAN 11 (2004) (in Russian)
Research Report: Secure Use of VLANs: An @stake Security Assessment (2002)
The main protective mechanisms used in systems to protect information, http://asher.ru/security/book/its/07 (in Russian)
How To Design an Access Control Matrix for Your Organization, http://www.howtodothings.com/business/how-to-design-an-access-control-matrix-for-your-organization
Wang, G., Dexter, T.W., Punch, V.F., Goodman, E.D.: Optimization of GA and Within a GA for a 2-Dimensional Layout Problem. In: First International Conference on Evolutionary Computation and Its Application (1996)
Shaffer, J.D., Eshelman, L.J.: Combinatorial Optimization by Genetic Algorithms: The Value of the Genotype/Phenotype Distinction. In: First International Conference on Evolutionary Computation and Its Application (1996)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Saenko, I., Kotenko, I. (2010). Genetic Optimization of Access Control Schemes in Virtual Local Area Networks. In: Kotenko, I., Skormin, V. (eds) Computer Network Security. MMM-ACNS 2010. Lecture Notes in Computer Science, vol 6258. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14706-7_16
Download citation
DOI: https://doi.org/10.1007/978-3-642-14706-7_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-14705-0
Online ISBN: 978-3-642-14706-7
eBook Packages: Computer ScienceComputer Science (R0)