Cyberspace-Oriented Access Control: Model and Policies

被引:2
|
作者
Li, Fenghua [1 ,2 ]
Li, Zifu [1 ,2 ]
Han, Weili [3 ]
Wu, Ting [4 ]
Chen, Lihua [5 ]
Guo, Yunchuan [1 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
[3] Fudan Univ, Sch Software, Shanghai, Peoples R China
[4] Hangzhou Dianzi Univ, Sch Cyberspace, Hangzhou, Zhejiang, Peoples R China
[5] Beijing Elect Sci & Technol Inst, Dept Informat Secur, Beijing, Peoples R China
来源
2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC) | 2017年
基金
中国国家自然科学基金;
关键词
D O I
10.1109/DSC.2017.100
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of information technologies, our daily life has become deeply dependent on cyberspace. The new technologies provide more facilities and enhancements to the existing Internet services as it allows users more flexibility in terms of exploring webpages, sending messages or publishing tweets via cell phones or laptops. However, there are many security issues such as security policy definition and security policy enforcement of current cyberspace. In this paper, we study information access problems in cyberspace where users leverage devices via the Internet to access sensitive objects with temporal and spatial limitations. We propose a Cyberspaceoriented Access Control model (CoAC) to ensure the security of the mentioned accesses in cyberspace. The proposed model consists of seven atomic operations, such as Read, Write, Store, Execute, Publish, Forward and Select, which can simulate most operations in cyberspace by the combination of several atomic operations. For each atomic operation, we assemble a suite of security policies and demonstrate its flexibility. By that, a series of security policies are denfined for CoAC.
引用
收藏
页码:261 / 266
页数:6
相关论文
共 50 条
  • [31] Access control policies and languages
    di Vimercati, Sabrina De Capitani
    Foresti, Sara
    Samarati, Pierangela
    Jajodia, Sushil
    INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2007, 3 (02) : 94 - 102
  • [32] A Model-Driven Approach for the Specification and Analysis of Access Control Policies
    Massacci, Fabio
    Zannone, Nicola
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2008, PT II, PROCEEDINGS, 2008, 5332 : 1087 - +
  • [33] A twofold model for the analysis of access control policies in industrial networked systems
    Bertolotti, Ivan Cibrario
    Durante, Luca
    Seno, Lucia
    Valenzano, Adriano
    COMPUTER STANDARDS & INTERFACES, 2015, 42 : 171 - 181
  • [34] Process oriented and model-supported teaching system in the cyberspace
    Gati, Jozsef
    Kartyas, Gyula
    2007 INTERNATIONAL SYMPOSIUM ON LOGISTICS AND INDUSTRIAL INFORMATICS, 2007, : 150 - 154
  • [35] The study on service oriented-architecture-based access control model
    JiaJu, Wu
    Gang, Liu
    DingYong, Tang
    ChuanYu, Xi
    Peng, Liu
    PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON CONSTRUCTION & REAL ESTATE MANAGEMENT, VOLS 1 AND 2, 2007, : 70 - 74
  • [36] Applications of the oriented permission role-based access control model
    Chen, Liang
    Crampton, Jason
    2007 IEEE INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE, VOLS 1 AND 2, 2007, : 387 - +
  • [37] Goal-Oriented Access Control Model for Ambient Assisted Living
    Massacci, Fabio
    Viet Hung Nguyen
    PRIVACY AND IDENTITY MANAGEMENT FOR LIFE, 2010, 320 : 160 - 173
  • [38] TRAC: A Therapeutic Regimen-oriented Access Control Model in Healthcare
    Gao, Hongcan
    Wu, Yanfeng
    Xu, Sihan
    Guo, Chenkai
    Hou, Xiaolei
    Xu, Jing
    2018 IEEE 42ND ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC 2018), VOL 2, 2018, : 388 - 393
  • [39] An Organization-Structure Oriented Access Control Model and It's Administration
    Zhao, Xiaolong
    Zhang, Yusen
    Zhu, Yingxun
    IEEC 2009: FIRST INTERNATIONAL SYMPOSIUM ON INFORMATION ENGINEERING AND ELECTRONIC COMMERCE, PROCEEDINGS, 2009, : 569 - +
  • [40] PLM-oriented multi-granular access control model
    Institute of CAPP and Manufacturing Engineering Software, Northwestern Polytechnical University, Xi'an 710072, China
    不详
    Jisuanji Jicheng Zhizao Xitong, 2008, 11 (2119-2128+2133):