Cyberspace-Oriented Access Control: Model and Policies

被引:2
|
作者
Li, Fenghua [1 ,2 ]
Li, Zifu [1 ,2 ]
Han, Weili [3 ]
Wu, Ting [4 ]
Chen, Lihua [5 ]
Guo, Yunchuan [1 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
[3] Fudan Univ, Sch Software, Shanghai, Peoples R China
[4] Hangzhou Dianzi Univ, Sch Cyberspace, Hangzhou, Zhejiang, Peoples R China
[5] Beijing Elect Sci & Technol Inst, Dept Informat Secur, Beijing, Peoples R China
来源
2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC) | 2017年
基金
中国国家自然科学基金;
关键词
D O I
10.1109/DSC.2017.100
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of information technologies, our daily life has become deeply dependent on cyberspace. The new technologies provide more facilities and enhancements to the existing Internet services as it allows users more flexibility in terms of exploring webpages, sending messages or publishing tweets via cell phones or laptops. However, there are many security issues such as security policy definition and security policy enforcement of current cyberspace. In this paper, we study information access problems in cyberspace where users leverage devices via the Internet to access sensitive objects with temporal and spatial limitations. We propose a Cyberspaceoriented Access Control model (CoAC) to ensure the security of the mentioned accesses in cyberspace. The proposed model consists of seven atomic operations, such as Read, Write, Store, Execute, Publish, Forward and Select, which can simulate most operations in cyberspace by the combination of several atomic operations. For each atomic operation, we assemble a suite of security policies and demonstrate its flexibility. By that, a series of security policies are denfined for CoAC.
引用
收藏
页码:261 / 266
页数:6
相关论文
共 50 条
  • [21] A model for checking consistency in access control policies for network management
    Cridlig, Vincent
    State, Radu
    Festor, Olivier
    2007 10TH IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM 2009), VOLS 1 AND 2, 2007, : 11 - +
  • [22] A Meta-level Access Control Model for Adapting Diverse Access Control Policies on OS Environment
    Park, Jun-Hyung
    Kim, Jung-Sun
    Seo, Jae-Hyun
    Kim, Minsoo
    SECTECH: 2008 INTERNATIONAL CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2008, : 169 - +
  • [23] Delegation Management in Service Oriented Decentralized Access Control Model
    Wang, Houxiang
    Han, Ruofei
    Jing, Xiaopei
    Yang, Hong
    PROCEEDINGS OF INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY (ISCSCT 2009), 2009, : 316 - 320
  • [24] A Security Model for Access Control in Graph-Oriented Databases
    Morgado, Claudia
    Baioco, Gisele Busichia
    Basso, Tania
    Moraes, Regina
    2018 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS 2018), 2018, : 135 - 142
  • [25] Study on Access Control Model of Service-Oriented Computing
    Zhang Yongsheng
    Liu Guangyu
    Li Jing
    Li Chengcheng
    2009 INTERNATIONAL FORUM ON COMPUTER SCIENCE-TECHNOLOGY AND APPLICATIONS, VOL 1, PROCEEDINGS, 2009, : 239 - 242
  • [26] Information flow in a purpose-oriented access control model
    Yasuda, M
    Tachikawa, T
    Takizawa, M
    1997 INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS, PROCEEDINGS, 1997, : 244 - 249
  • [27] Integrating object oriented role-based access control model with mandatory access control principles
    Zhang, CN
    Yang, CG
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2003, 43 (03) : 40 - 49
  • [28] Resiliency Policies in Access Control
    Li, Ninghui
    Wang, Qihua
    Tripunitara, Mahesh
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2009, 12 (04)
  • [29] On the negotiation of access control policies
    Gligor, VD
    Khurana, H
    Koleva, RK
    Bharadwaj, VG
    Baras, JS
    SECURITY PROTOCOLS, 2002, 2467 : 188 - 201
  • [30] Optimization of Access Control Policies
    Kern, Sascha
    Baumer, Thomas
    Groll, Sebastian
    Fuchs, Ludwig
    Pernul, Guenther
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 70