Cyberspace-Oriented Access Control: Model and Policies

被引:2
|
作者
Li, Fenghua [1 ,2 ]
Li, Zifu [1 ,2 ]
Han, Weili [3 ]
Wu, Ting [4 ]
Chen, Lihua [5 ]
Guo, Yunchuan [1 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
[3] Fudan Univ, Sch Software, Shanghai, Peoples R China
[4] Hangzhou Dianzi Univ, Sch Cyberspace, Hangzhou, Zhejiang, Peoples R China
[5] Beijing Elect Sci & Technol Inst, Dept Informat Secur, Beijing, Peoples R China
来源
2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC) | 2017年
基金
中国国家自然科学基金;
关键词
D O I
10.1109/DSC.2017.100
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of information technologies, our daily life has become deeply dependent on cyberspace. The new technologies provide more facilities and enhancements to the existing Internet services as it allows users more flexibility in terms of exploring webpages, sending messages or publishing tweets via cell phones or laptops. However, there are many security issues such as security policy definition and security policy enforcement of current cyberspace. In this paper, we study information access problems in cyberspace where users leverage devices via the Internet to access sensitive objects with temporal and spatial limitations. We propose a Cyberspaceoriented Access Control model (CoAC) to ensure the security of the mentioned accesses in cyberspace. The proposed model consists of seven atomic operations, such as Read, Write, Store, Execute, Publish, Forward and Select, which can simulate most operations in cyberspace by the combination of several atomic operations. For each atomic operation, we assemble a suite of security policies and demonstrate its flexibility. By that, a series of security policies are denfined for CoAC.
引用
收藏
页码:261 / 266
页数:6
相关论文
共 50 条
  • [41] Field access analysis for enforcing access control policies
    Lehmann, Kathrin
    Thiemann, Peter
    EMERGING TRENDS IN INFORMATION AND COMMUNICATION SECURITY, PROCEEDINGS, 2006, 3995 : 337 - 351
  • [42] Adventures in the Analysis of Access Control Policies
    Anh Truong
    FUTURE DATA AND SECURITY ENGINEERING (FDSE 2019), 2019, 11814 : 467 - 482
  • [43] Testing Access Control and Obligation Policies
    Xu, Dianxiang
    Sanford, Michael
    Liu, Zhaoliang
    Emry, Mark
    Brockmueller, Brad
    Johnson, Spencer
    To, Michael
    2013 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2013,
  • [44] Automated decomposition of access control policies
    Su, LY
    Chadwick, DW
    Basden, A
    Cunningham, JA
    SIXTH IEEE INTERNATIONAL WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS, 2005, : 3 - 13
  • [45] Access Control Policies for Semantic Networks
    Ryutov, Tatyana
    Kichkaylo, Tatiana
    Neches, Robert
    2009 IEEE INTERNATIONAL SYMPOSIUM ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, 2009, : 150 - 157
  • [46] Verification and enforcement of access control policies
    Antonio Cau
    Helge Janicke
    Ben Moszkowski
    Formal Methods in System Design, 2013, 43 : 450 - 492
  • [47] Policies, models, and languages for access control
    di Vimercati, SD
    Samarati, P
    Jajodia, S
    DATABASES IN NETWORKED INFORMATION SYSTEMS, PROCEEDINGS, 2005, 3433 : 225 - 237
  • [48] Quantifying Permissiveness of Access Control Policies
    Eiers, William
    Sankaran, Ganesh
    Li, Albert
    O'Mahony, Emily
    Prince, Benjamin
    Bultan, Tevfik
    2022 ACM/IEEE 44TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2022), 2022, : 1805 - 1817
  • [49] Testing and analysis of access control policies
    Martin, Evan
    29TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING: ICSE 2007 COMPANION VOLUME, PROCEEDINGS, 2007, : 75 - 76
  • [50] Formal analysis of access control policies
    Bryans, Jeremy W.
    PROCEEDINGS OF THE UK E-SCIENCE ALL HANDS MEETING 2006, 2006, : 701 - 708