A Lightweight Graph-Based Model for Inter-networking Access Control

被引:0
|
作者
Kang, Zhongmiao [1 ]
Jiang, Wenting [1 ]
Chen, Yan [1 ]
机构
[1] Guangdong Power Grid Corp, Guangzhou 510000, Guangdong, Peoples R China
来源
CLOUD COMPUTING AND SECURITY, PT IV | 2018年 / 11066卷
关键词
Access control; Privilege management; Graph theory; Networking;
D O I
10.1007/978-3-030-00015-8_51
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In classic operation systems, processes are assigned different privileges according to the resources. The enforcement of privilege differentiation on diverse processes indicates that strict security management on the individual process, whose emphasis on the restriction on respective process, however, may also overlook the security risk among the processes. Specifically, one process can invoke another one and establish a session, during which the privileges of invoked process may be passed to the invoking process (e. g., by the inter-processes requests). Thus, it may result in the abuse of privilege and resource leakage. Moreover, the internetworking of the processes and their relations also complicate the tasks for the regulation on authorized privileges, and those can be obtained by inheritance. The management on the latter case (i. e., the inherited privileges) has not been well considered in the existing access control models, whose implementation also incur large overhead. In this paper, we propose a lightweight graph-based access control model to manage the privileges between the networked processes, which provides a general solution for the pervasive applicabilities such as process inter-invoking and network-based access control.
引用
收藏
页码:589 / 597
页数:9
相关论文
共 50 条
  • [21] A graph-based model for manufacturing complexity
    Jenab, K.
    Liu, D.
    INTERNATIONAL JOURNAL OF PRODUCTION RESEARCH, 2010, 48 (11) : 3383 - 3392
  • [22] A research on graph-based model of MAS
    Zhang, HB
    Zhao, JY
    Luo, XS
    2002 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-4, PROCEEDINGS, 2002, : 2077 - 2081
  • [23] A graph-based toy model of chemistry
    Benkö, G
    Flamm, C
    Stadler, PF
    JOURNAL OF CHEMICAL INFORMATION AND COMPUTER SCIENCES, 2003, 43 (04): : 1085 - 1093
  • [24] Graph-Based Process Model Matching
    Tsagkani, Christina
    BUSINESS PROCESS MANAGEMENT WORKSHOPS( BPM 2014), 2015, 202 : 573 - 577
  • [25] GEOLOCATION WITH GRAPH-BASED MODEL FITTING
    Dvorkind, Tsvi G.
    Eldar, Yonina C.
    2019 IEEE 8TH INTERNATIONAL WORKSHOP ON COMPUTATIONAL ADVANCES IN MULTI-SENSOR ADAPTIVE PROCESSING (CAMSAP 2019), 2019, : 356 - 360
  • [26] A Graph-Based Model for Combinatorial Auctions
    Diac, Paul
    2020 IEEE 16TH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTER COMMUNICATION AND PROCESSING (ICCP 2020), 2020, : 235 - 242
  • [27] An Encryption and Probability based Access Control Model for Named Data Networking
    Chen, Tao
    Lei, Kai
    Xu, Kuai
    2014 IEEE INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2014,
  • [28] Inter-domain Access Control Model Based on Blockchain
    Zhang, Jian-Biao
    Zhang, Zhao-Qian
    Xu, Wan-Shan
    Wu, Na
    Ruan Jian Xue Bao/Journal of Software, 2021, 32 (05): : 1547 - 1564
  • [29] Transition Graph-based Control of Quantum Eigenstates
    Kuang, Sen
    Cong, Shuang
    PROCEEDINGS OF THE 10TH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION (WCICA 2012), 2012, : 1750 - 1755
  • [30] Robust hierarchical model predictive control of graph-based power flow systems
    Koeln, Justin P.
    Alleyne, Andrew G.
    AUTOMATICA, 2018, 96 : 127 - 133