An Action Based Access Control Model for Multi-level Security

被引:0
|
作者
Su, Mang [1 ]
Li, Fenghua [2 ]
Shi, Guozhen [3 ]
Li, Li [3 ]
机构
[1] Xidian Univ, Natl Key Lab Integrated Serv Network, Xian 710071, Shaanxi, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, Beijing 100195, Peoples R China
[3] Beijing Elect Sci & Technol Inst, Dept Elect Engn, Beijing 100070, Peoples R China
基金
北京市自然科学基金; 中国国家自然科学基金;
关键词
multi-level security; access control; action; security level; structured document;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The new computing modes, such as mobile computing, distributed computing, cloud computing and ubiquitous computing, etc., have brought about diversification and open features to the expression, exchange and access of computer network information. The multilevel security management is widely used in operation systems and information management systems. Focus on the multi-level security problem in various network environments, this paper defines the security identity, environment and temporal state of object, based on the ABAC (Action Based Access Control), and shows the security level, access scope and the demand of environment and temporal state of accessing subject, then proposes a multi-level security access control mechanism. Finally, an application example is given.
引用
收藏
页码:359 / 366
页数:8
相关论文
共 50 条
  • [41] The Multi-level Security for the Android OS
    Oh, Ji-Soo
    Park, Min-Woo
    Chung, Tai-Myoung
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2014, PT IV, 2014, 8582 : 743 - +
  • [42] Multi-Level network security architecture
    Luo, J.Z.
    Liu, Y.Y.
    2001, Chinese Academy of Sciences (12):
  • [43] Multi-level data security program based on quantum key
    Zhu, De-Xin
    Li, Xin-Jian
    An, Ya-Ting
    Zhou, Jun-Wei
    Huang, Qi-Yuan
    Li, Xiao-Hui
    Wu, Jia-Nan
    Song, Li-Jun
    Journal of Computers (Taiwan), 2021, 32 (02) : 164 - 175
  • [44] Bacteriorhodopsin-based multi-level optical security features
    Hampp, N
    Neebe, M
    OPTICAL SECURITY AND COUNTERFEIT DETERRENCE TECHNIQUES VI, 2006, 6075
  • [45] A Container-based Trusted Multi-level Security Mechanism
    Li, Xiao-Yong
    Ji, Chen
    Liu, Gang
    2017 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY (IST 2017), 2017, 11
  • [46] OCDM-based all optical multi-level security
    Etemad, Shahab
    Agarwal, Anjali
    Habiby, Sarry
    Jackel, Janet
    Menendez, Ron
    Toliver, Paul
    2007 IEEE AVIONICS, FIBER-OPTICS AND PHOTONICS TECHNOLOGY CONFERENCE, 2007, : 30 - 31
  • [47] Formal Modeling of Multi-Level Security and Integrity Control Implemented with SELinux
    Kuliamin, Victor V.
    Khoroshilov, Alexey V.
    Medvedev, Denis L.
    2019 ACTUAL PROBLEMS OF SYSTEMS AND SOFTWARE ENGINEERING (APSSE 2019), 2019, : 131 - 136
  • [48] Model-based Diagnosis and Fault Tolerant Control for Multi-Level Inverters
    Alavi, Marjan
    Wang, Danwei
    Luo, Ming
    IECON 2015 - 41ST ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY, 2015, : 1548 - 1553
  • [49] Multi-Level modeling and access control for data sharing in collaborative design
    Kim, T
    Cera, CD
    Regli, WC
    Choo, H
    Han, J
    ADVANCED ENGINEERING INFORMATICS, 2006, 20 (01) : 47 - 57
  • [50] Efficient Multi-Level Access Control for Geo-Contents Maintenance
    Park, Sun-Rae
    Lee, Jong Suk Ruth
    Cho, Kum Won
    Lee, Kyu-Chul
    STUDIES IN INFORMATICS AND CONTROL, 2013, 22 (01): : 91 - 96