Description Logic modeling of temporal Attribute-Based Access Control

被引:0
|
作者
Peng Jin [1 ]
Yang Fang-chun [1 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100088, Peoples R China
关键词
security; Description Logic; access control;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In large-scale open systems like Internet, Attribute Based Access Control is more appropriate than some other access control mechanisms. A fragment of description logic can be used to represent and reason about policies of attribute-based access control, because with logic descriptions, policies have a clear syntax and semantics. Further more, with the description logic modeling, ABAC policies and subject attributes assertions are easy to be integrated with Semantic Web language which is designed to facilitate the machine interpretability and interoperability in distributed environment. The Description Logic representation is flexible to hold broad scope of information about users and contexts, The temporal properties of access control are also specified in our model.
引用
收藏
页码:414 / +
页数:2
相关论文
共 50 条
  • [41] Attribute-based access control model for cloud computing
    Wang, Jingyu
    Feng, Lixiao
    Zheng, Xuefeng
    [J]. Zhongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Central South University (Science and Technology), 2015, 46 (06): : 2090 - 2097
  • [42] Attribute-based Access Control for ICN Naming Scheme
    Li, Bing
    Huang, Dijiang
    Wang, Zhijie
    Zhu, Yan
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (02) : 194 - 206
  • [43] Integration of Attribute-based Access Control into Automotive Architectures
    Rumez, Marcel
    Duda, Alexander
    Gruender, Patrick
    Kriesten, Reiner
    Sax, Eric
    [J]. 2019 30TH IEEE INTELLIGENT VEHICLES SYMPOSIUM (IV19), 2019, : 1916 - 1922
  • [44] Attribute-Based Hierarchical Access Control With Extendable Policy
    Xiao, Meiyan
    Li, Hongbo
    Huang, Qiong
    Yu, Shui
    Susilo, Willy
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 1868 - 1883
  • [45] On the Feasibility of Attribute-Based Encryption for WLAN Access Control
    Pisa, Claudio
    Dargahi, Tooska
    Caponi, Alberto
    Bianchi, Giuseppe
    Blefari-Melazzi, Nicola
    [J]. 2017 IEEE 13TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2017, : 783 - 790
  • [46] The research on attribute-based access control model for web
    Zhang, Hongqi
    Zhou, Jing
    Chen, Hongwu
    [J]. 2007 INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE & TECHNOLOGY, PROCEEDINGS, 2007, : 1126 - 1128
  • [47] Attribute-Based Access Control in an Adaptive Hypermedia System
    Ballesteros, Pedro
    Donoso, Yezid
    [J]. 2009 FOURTH INTERNATIONAL CONFERENCE ON SYSTEMS (ICONS), 2009, : 114 - 119
  • [48] Attribute-based lightweight reconfigurable access control policy
    Xie R.
    Li H.
    Shi G.
    Guo Y.
    [J]. Tongxin Xuebao/Journal on Communications, 2020, 41 (02): : 112 - 122
  • [49] Firewall for Attribute-Based Access Control in Smart Grids
    Ruland, Christoph
    Sassmannshausen, Jochen
    [J]. 2018 THE 6TH IEEE INTERNATIONAL CONFERENCE ON SMART ENERGY GRID ENGINEERING (SEGE 2018), 2018, : 336 - 341
  • [50] Efficiently Supporting Attribute-Based Access Control in Linux
    Varshith, H. O. Sai
    Sural, Shamik
    Vaidya, Jaideep
    Atluri, Vijayalakshmi
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 2012 - 2026