Study on Security Domain-Oriented Military Information Systems Access Control Model

被引:2
|
作者
Jin, Yan [1 ]
Liu, Hao [2 ]
Sun, Lin [1 ]
Song, Jing [3 ]
机构
[1] Natl Def Informat Acad, Dept 4, Wuhan, Peoples R China
[2] Nanchang Mil Acad, Informat Teaching & Res Sect, Nanchang, Jiangxi, Peoples R China
[3] Natl Def Informat Acad, Dept 3, Wuhan, Peoples R China
关键词
Security domain; Access control; Model components; Basic constraints;
D O I
10.1007/978-3-642-54927-4_81
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The access control of military information systems (MIS) is an important issue that imposes significant influence on the MIS security. First of all, we did in-depth analysis of the main factors of access control model, such as the basic principle and constraints of models, the formal definition of model components, and the permissions and inheritance of models. Furthermore, the idea of security domain management and control is introduced in this chapter and based on existing access control model, SDO-ARBAC (Security Domain-Oriented-Administrative Role-Based Control Model) is built which is more suitable for MIS access control.
引用
收藏
页码:849 / +
页数:2
相关论文
共 50 条
  • [21] DomBERT: Domain-oriented Language Model for Aspect-based Sentiment Analysis
    Xu, Hu
    Liu, Bing
    Shu, Lei
    Yu, Philip S.
    [J]. FINDINGS OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS, EMNLP 2020, 2020, : 1725 - 1731
  • [22] Description logic framework for access control and security in object-oriented systems
    Chae, Jung Hwa
    Shiri, Nematollaah
    [J]. ROUGH SETS, FUZZY SETS, DATA MINING AND GRANULAR COMPUTING, PROCEEDINGS, 2007, 4482 : 565 - +
  • [23] The hybrid model for web services security Access control and information flow control
    Kedjar, Saadia
    Tari, Abdelkamel
    [J]. 2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2013, : 194 - +
  • [24] Security Constraints in Modeling of Access Control Rules for Dynamic Information Systems
    Poniszewska-Maranda, Aneta
    [J]. SOFSEM 2014: THEORY AND PRACTICE OF COMPUTER SCIENCE, 2014, 8327 : 466 - 477
  • [25] Service oriented decentralized access control for military systems in Net-Centric Environment
    Han Ruo-Fei
    Wang Hou-Xiang
    Xiao Qian
    Jing Xiao-Pei
    Li Hui
    [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, VOL II, 2009, : 209 - 214
  • [26] Extended model of Access Control for the Library Information Systems
    Normatov, Sherbek
    Rakhmatullaev, Marat
    [J]. 2017 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND COMMUNICATIONS TECHNOLOGIES (ICISCT) - APPLICATIONS, TRENDS AND OPPORTUNITIES, 2017,
  • [27] The Cloud Data Security and Access Control Model in the Study
    Dong, Jing
    [J]. PROCEEDINGS OF THE 2016 7TH INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT, COMPUTER AND MEDICINE (EMCM 2016), 2017, 59 : 498 - 500
  • [28] An Access Control Model for Grid Computing Based on Security Information Evaluation
    Xie, Ping
    Zhou, Jiang
    [J]. 2009 INTERNATIONAL CONFERENCE ON FUTURE BIOMEDICAL INFORMATION ENGINEERING (FBIE 2009), 2009, : 49 - 52
  • [29] A SECURITY MODEL FOR MILITARY MESSAGE SYSTEMS
    LANDWEHR, CE
    HEITMEYER, CL
    MCLEAN, J
    [J]. ACM TRANSACTIONS ON COMPUTER SYSTEMS, 1984, 2 (03): : 198 - 222
  • [30] Security access control policy of information system under multi-domain mode
    Dong, Jun
    Zhao, Qiang
    [J]. INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2018, 11 (01) : 44 - 50