Novel cyberspace-oriented access control model

被引:0
|
作者
Li F.-H. [1 ]
Wang Y.-C. [1 ]
Yin L.-H. [1 ]
Xie R.-N. [2 ]
Xiong J.-B. [1 ]
机构
[1] The State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing
[2] Department of Information Security, Beijing Electronic Science and Technology Institute, Beijing
来源
关键词
Access control; Administrative scene; Cyberspace security; Information dissemination mode; Information service pattern;
D O I
10.11959/j.issn.1000-436x.2016109
中图分类号
学科分类号
摘要
A novel cyberspace-oriented access control model was proposed, termed as CoAC, which avoided the threats by comprehensively considering vital factors, such as the access requesting entity, general tense, access point, device, networks, resource, internet-based interactive graph and chain of resource transmission. By appropriately adjusting these factors, CoAC emulated most of typical access control models and fulfilled the requirements of new information service patterns and dissemination modes. The administrative model of CoAC was also presented and the functions and methods for administrating CoAC were described by utilizing Z-notation. CoAC is flexible and scalable, it can be further refined and expanded to figure out new opportunities and challenges in the upcoming access control techniques. © 2016, Editorial Board of Journal on Communications. All right reserved.
引用
收藏
页码:9 / 20
页数:11
相关论文
共 35 条
  • [1] Glossary of computer security terms NCSC-TG-004
  • [2] Bell D.E., Lapadula L.J., Secure computer systems: mathematical foundations, (1973)
  • [3] Stallings W., Network and Internetwork Security: Principles and Practice, (1995)
  • [4] Ferraiolo D.F., Kuhn D.R., Role-based access control, National Computer Security Conference, pp. 554-563, (1992)
  • [5] Oh S., Sandhu R., Zhang X., An effective role administration model using organization structure, ACM Transactions on Information and System Security (TISSEC), 9, 2, pp. 113-137, (2006)
  • [6] Sandhu R., Bhamidipati V., Munawer Q., The ARBAC97 model for role-based administration of roles, ACM Transactions on Information and System Security, 2, 1, pp. 105-135, (1999)
  • [7] Sandhu R., Munawer Q., The ARBAC99 model for administration of roles, Annual Computer Security Applications Conference, pp. 229-238, (1999)
  • [8] Sandhu R.S., Coyne E.J., Feinstein H.L., Et al., Role-based access control models, Computer, 2, pp. 38-47, (1996)
  • [9] Freudenthal E., Pesin T., Port L., Et al., dRBAC: distributed role-based access control for dynamic coalition environments, International Conference on Distributed Computing System, pp. 411-420, (2002)
  • [10] Liu S., Huang H., Role-based access control for distributed cooperation environment, International Conference on Computational Intelligence and Security, pp. 455-459, (2009)