Novel cyberspace-oriented access control model

被引:0
|
作者
Li F.-H. [1 ]
Wang Y.-C. [1 ]
Yin L.-H. [1 ]
Xie R.-N. [2 ]
Xiong J.-B. [1 ]
机构
[1] The State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing
[2] Department of Information Security, Beijing Electronic Science and Technology Institute, Beijing
来源
Tongxin Xuebao/Journal on Communications | 2016年 / 37卷 / 05期
关键词
Access control; Administrative scene; Cyberspace security; Information dissemination mode; Information service pattern;
D O I
10.11959/j.issn.1000-436x.2016109
中图分类号
学科分类号
摘要
A novel cyberspace-oriented access control model was proposed, termed as CoAC, which avoided the threats by comprehensively considering vital factors, such as the access requesting entity, general tense, access point, device, networks, resource, internet-based interactive graph and chain of resource transmission. By appropriately adjusting these factors, CoAC emulated most of typical access control models and fulfilled the requirements of new information service patterns and dissemination modes. The administrative model of CoAC was also presented and the functions and methods for administrating CoAC were described by utilizing Z-notation. CoAC is flexible and scalable, it can be further refined and expanded to figure out new opportunities and challenges in the upcoming access control techniques. © 2016, Editorial Board of Journal on Communications. All right reserved.
引用
收藏
页码:9 / 20
页数:11
相关论文
共 35 条
  • [31] Bethencourt J., Waters B., Ciphertext-policy attribute-based encryption, IEEE Symposium on Security and Privacy, pp. 321-334, (2007)
  • [32] Hong C., Zhang M., Feng D.G., AB-ACCS: a cryptographic access control scheme for cloud storage, Journal of Computer Research and Development, 47, Z1, pp. 259-265, (2010)
  • [33] Cheng Y., Ren J., Wang Z., Et al., Re-encryption optimization in CP-ABE based cryptographic cloud storage, International Conference on Cloud and Green Computing, pp. 173-179, (2012)
  • [34] Chase M., Chow S.S.M., Improving privacy and security in multi-authority attribute-based encryption, ACM conference on Computer and Communications Security, pp. 121-130, (2009)
  • [35] Liu X., Zhang Y., Wang B., Et al., Mona: secure multi-owner data sharing for dynamic groups in the cloud, IEEE Transaction on Parallel and Distributed Systems, 24, 6, pp. 1182-1191, (2013)