An Action Based Access Control Model for Multi-level Security

被引:0
|
作者
Su, Mang [1 ]
Li, Fenghua [2 ]
Shi, Guozhen [3 ]
Li, Li [3 ]
机构
[1] Xidian Univ, Natl Key Lab Integrated Serv Network, Xian 710071, Shaanxi, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, Beijing 100195, Peoples R China
[3] Beijing Elect Sci & Technol Inst, Dept Elect Engn, Beijing 100070, Peoples R China
基金
北京市自然科学基金; 中国国家自然科学基金;
关键词
multi-level security; access control; action; security level; structured document;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The new computing modes, such as mobile computing, distributed computing, cloud computing and ubiquitous computing, etc., have brought about diversification and open features to the expression, exchange and access of computer network information. The multilevel security management is widely used in operation systems and information management systems. Focus on the multi-level security problem in various network environments, this paper defines the security identity, environment and temporal state of object, based on the ABAC (Action Based Access Control), and shows the security level, access scope and the demand of environment and temporal state of accessing subject, then proposes a multi-level security access control mechanism. Finally, an application example is given.
引用
收藏
页码:359 / 366
页数:8
相关论文
共 50 条
  • [21] A Proposal for a Zero-Trust-Based Multi-Level Security Model and Its Security Controls
    Park, Jun-Hyung
    Park, Sung-Chae
    Youm, Heung-Youl
    APPLIED SCIENCES-BASEL, 2025, 15 (02):
  • [22] Enhancing Security of the Android Platform via Multi-level Security Model
    Oh, Ji-Soo
    Park, Min-Woo
    Chung, Tai-Myoung
    APPLICATIONS AND TECHNIQUES IN INFORMATION SECURITY, ATIS 2014, 2014, 490 : 13 - 24
  • [23] Multi-Level Hesitant Fuzzy Based Model for Usable-Security Assessment
    Nadeem, Mohd
    Al-Amri, Jehad F.
    Subahi, Ahmad F.
    Seh, Adil Hussain
    Khan, Suhel Ahmad
    Agrawal, Alka
    Khan, Raees Ahmad
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2022, 31 (01): : 61 - 82
  • [24] Model based multi-level prototyping
    Bredenfeld, A
    Wilberg, J
    TENTH IEEE INTERNATIONAL WORKSHOP ON RAPID SYSTEMS PROTOTYPING, PROCEEDINGS, 1999, : 190 - 195
  • [25] Multi-level Reliable Security Mechanism Based on SpaceOS
    Liu, Hongyi
    Xuan Hao
    Liu Jingang
    PROCEEDING OF THE 2019 INTERNATIONAL CONFERENCE ON COMPUTER, INFORMATION AND TELECOMMUNICATION SYSTEMS (IEEE CITS 2019), 2019, : 281 - 285
  • [26] A Mandatory Access Control Framework in Virtual Machine System with Respect to Multi-level Security I: Theory
    Liu Qian
    Wang Guanhai
    Weng Chuliang
    Luo Yuan
    Li Minglu
    CHINA COMMUNICATIONS, 2010, 7 (04) : 137 - 143
  • [27] Fuzzy multi-level security : An experiment on quantified risk-adaptive access control - Extended abstract
    Cheng, Pau-Chen
    Rohatgi, Pankaj
    Keser, Claudia
    Karger, Paul A.
    Wagner, Grant M.
    Reninger, Angela Schuett
    2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 222 - +
  • [28] A Mandatory Access Control Framework in Virtual Machine System with Respect to Multi-level Security II: Implementation
    Liu Qian
    Wang Guanhai
    Weng Chuliang
    Luo Yuan
    Li Minglu
    CHINA COMMUNICATIONS, 2011, 8 (02) : 86 - 94
  • [29] Multi-level Data Access Control in Positive Energy Districts
    Aslam, Sidra
    Bukovszki, Viktor
    Mrissa, Michael
    SUSTAINABILITY IN ENERGY AND BUILDINGS 2021, 2022, 263 : 553 - 565
  • [30] Multi-level delegations with trust management in access control systems
    Li, Min
    Sun, Xiaoxun
    Wang, Hua
    Zhang, Yanchun
    JOURNAL OF INTELLIGENT INFORMATION SYSTEMS, 2012, 39 (03) : 611 - 626