Cyberspace-Oriented Access Control: Model and Policies

被引:2
|
作者
Li, Fenghua [1 ,2 ]
Li, Zifu [1 ,2 ]
Han, Weili [3 ]
Wu, Ting [4 ]
Chen, Lihua [5 ]
Guo, Yunchuan [1 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
[3] Fudan Univ, Sch Software, Shanghai, Peoples R China
[4] Hangzhou Dianzi Univ, Sch Cyberspace, Hangzhou, Zhejiang, Peoples R China
[5] Beijing Elect Sci & Technol Inst, Dept Informat Secur, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
D O I
10.1109/DSC.2017.100
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of information technologies, our daily life has become deeply dependent on cyberspace. The new technologies provide more facilities and enhancements to the existing Internet services as it allows users more flexibility in terms of exploring webpages, sending messages or publishing tweets via cell phones or laptops. However, there are many security issues such as security policy definition and security policy enforcement of current cyberspace. In this paper, we study information access problems in cyberspace where users leverage devices via the Internet to access sensitive objects with temporal and spatial limitations. We propose a Cyberspaceoriented Access Control model (CoAC) to ensure the security of the mentioned accesses in cyberspace. The proposed model consists of seven atomic operations, such as Read, Write, Store, Execute, Publish, Forward and Select, which can simulate most operations in cyberspace by the combination of several atomic operations. For each atomic operation, we assemble a suite of security policies and demonstrate its flexibility. By that, a series of security policies are denfined for CoAC.
引用
收藏
页码:261 / 266
页数:6
相关论文
共 50 条
  • [1] Cyberspace-Oriented Access Control: A Cyberspace Characteristics-Based Model and Its Policies
    Li, Fenghua
    Li, Zifu
    Han, Weili
    Wu, Ting
    Chen, Lihua
    Guo, Yunchuan
    Chen, Jinjun
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (02) : 1471 - 1483
  • [2] Novel cyberspace-oriented access control model
    Li F.-H.
    Wang Y.-C.
    Yin L.-H.
    Xie R.-N.
    Xiong J.-B.
    Tongxin Xuebao/Journal on Communications, 2016, 37 (05): : 9 - 20
  • [3] A Service Access Security Control Model in Cyberspace
    Li Qianmu
    Yin Jie
    Hou Jun
    Xu Jian
    Zhang Hong
    Qi Yong
    INTELLIGENT COMPUTING AND INFORMATION SCIENCE, PT I, 2011, 134 (0I): : 434 - +
  • [4] Privacy Policies Model in Access Control
    Werner, Jorge
    Westphall, Carla Merkle
    Vargas, Andre Azevedo
    Westphall, Carlos Becker
    2019 13TH ANNUAL IEEE INTERNATIONAL SYSTEMS CONFERENCE (SYSCON), 2019,
  • [5] Regulating cyberspace: The policies and technologies of control
    Smillie, K
    IEEE ANNALS OF THE HISTORY OF COMPUTING, 2004, 26 (04) : 77 - 77
  • [6] Regulating cyberspace: The policies and technologies of control
    Landgraf, LM
    JOURNAL OF GOVERNMENT INFORMATION, 2002, 29 (05): : 340 - 342
  • [7] An Obligation Model Bridging Access Control Policies and Privacy Policies
    Ni, Qun
    Bertino, Elisa
    Lobo, Jorge
    SACMAT'08: PROCEEDINGS OF THE 13TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2008, : 133 - 142
  • [8] Algebraic Model for Handling Access Control Policies
    Sabri, Khair Eddin
    Hiary, Hazem
    7TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT 2016) / THE 6TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2016) / AFFILIATED WORKSHOPS, 2016, 83 : 653 - 657
  • [9] Model-checking access control policies
    Guelev, DP
    Ryan, M
    Schobbens, PY
    INFORMATION SECURITY, PROCEEDINGS, 2004, 3225 : 219 - 230
  • [10] The Study on Service Oriented Access Control Model
    Wu, JiaJu
    Xi, ChuanYu
    ICIC 2009: SECOND INTERNATIONAL CONFERENCE ON INFORMATION AND COMPUTING SCIENCE, VOL 1, PROCEEDINGS: COMPUTING SCIENCE AND ITS APPLICATION, 2009, : 50 - 53