期刊文献+

基于动态情景网关的系统协同访问控制模型 被引量:3

Dynamic situation gateway based system cooperation access gatel model
下载PDF
导出
摘要 为适应网构环境下应用系统主客体间访问集中控制的需要,提出了一种基于动态情景网关的系统协同访问控制模型DSGAC。首先,给出了网构应用系统中访问的动态情景要素构成,从多视角定义了情景要素;其次,提供动态情景状态机的概念,并给出了动态情景机约束下的系统协同访问网关模型DSGAC,支持情景状态演算、规则演算;最后,实际案例应用验证表明DSGAC模型在应用系统的应用可行性,并归纳了其与现有访问控制模型的相对创新性。 In order to adapt the centralized access control between the application system subject and object in the environment of network configurations, a dynamic situation based system cooperation access gatel model — DSGAC was proposed. To begin with, the constitution of dynamic situational factors of access controls in the application systems of network configurations was analyzed, defining the factor of situation from muti-perspective. Furthermore, the concept of dynamic situational finite state machine was provided and a system cooperation access gatel model supporting calculations and rules of the situation was presented under the constraint of dynamic situations. Finally, the real case application shows the feasibility and validation of the DSGAC model between the application systems. Additionally, the relative innovativeness between DSGAC model and existing access control models was summerized.
作者 郭树行 张禹
出处 《通信学报》 EI CSCD 北大核心 2013年第S1期142-147,共6页 Journal on Communications
基金 国家自然科学基金资助项目(61103198 61100112 60970143) 教育部科学技术重点项目基金(109016) 教育部人文社会科学研究青年基金资助项目(11YJCZH006) 中央财经大学学科建设基金资助项目(CUFEIE201107)~~
关键词 情景网关 系统协同 访问控制 情景演算 状态机 situation gatel system cooperation access control situation calculation finite state machine
  • 相关文献

参考文献5

二级参考文献39

  • 1钟勇,秦小麟,郑吉平,林冬梅.一种灵活的使用控制授权语言框架研究[J].计算机学报,2006,29(8):1408-1418. 被引量:15
  • 2F Ferraiolo,R Sandhu,R Kuhn.Proposed NIST standard for role-based access control[J].ACM Transaction on Information and System Security,2001,4(3):224-274.
  • 3E Bertino,C Bettini.An access control model supporting periodicity constraints and temporal reasoning[J].ACM Transactions on Database Systems,1998,23(3):231-285.
  • 4L GiuRi,P IgLio.A formal model for role-based access control with constrains[A].In the Proceedings of the 9th IEEE Workshop on Computer Security Foundations[C].USA:IEEE Press,1996.136-145.
  • 5Trent Jaeger.On the increasing importance of constraints[A].In the Proceedings of the 4th ACM Workshop on Role-Based Access Control[C].USA:ACM Press,1999.33-42.
  • 6E Bertino,P A Bonatti,E Ferrari.TRBAC:A temporal role-based access control model[J].ACM Transactions on Information and System Security,2001,4(3):58-90.
  • 7S Barker.TRBACN:A Temporal Authorization Model[M].Lecture Notes in Computer Science,Berlin:Springer-verlag Press,2001.
  • 8Gladney H.M., Meyers J.J., Worley E.L. Access control mechanism for computing resources. IBM Systems Journal, 1975, 14(3): 212~228
  • 9Anderson J.P. Computer security technology planning study. Air Force Electronic Systems Division, Hanscom AFB, Bedford, MA: Technical Report ESDTR-73-51, 1972
  • 10Xu Feng, Xie Jun, Huang Hao, Xie Li. Context-aware role-based access control model for Web services. Lecture Notes in Computer Science 3252, 2004, 430~436

共引文献149

同被引文献37

  • 1SAHAI A, WATERS B. Fuzzy identity-based encryp-tion[C]//Advances in Cryptology - Eurocrypt 2005. Springer, BerlinHeidelberg, c2005:457-473.
  • 2GOYAL OP V, SAHAI A, WATERS B. Attribute based encryption forfine-grained access conrol of encrypted data[C]//13th ACM Confer-ence on Computer and Communications Security. Alexandria,c2006:89-98.
  • 3BETHENCOURT J, SAHAI A, WATERS B. Ciphertext-policy attrib-ute-based encryption[C]//IEEE Symposium on Security and Privacy.California, IEEE, c2007: 321-334.
  • 4LEWKO A, OKAMOTO T, SAHAI A, et al Fully secure functionalencryption: attribute-based encryption and (hierarchical) inner productencryption[C]//Advances in Cryptology EUROCRYPT 2010. Springer,Berlin Heidelberg, c2010: 62-91.
  • 5DENG H,WU Q, QIN B. Ciphertext-policy hierarchical attrib-ute-based encryption with short ciphertexts [J]. Information Sciences,2014,275(8): 370-384.
  • 6LI M, YU S C, ZHENG Y. Scalable and secure sharing of personalhealth records in cloud computing using attribute-based encryption[J].IEEE Transactions on Parallel and Distributed Systems, 2013,24(1):131-143.
  • 7FERRARA A L, FUCHSBAUER Q WARINSCHI B. Cryptographi-cally Enforced RBAC[C]//IEEE 26th Computer Security FoundationsSymposium (CSF). Louisiana, IEEE, c2013: 115-129.
  • 8ZHAO F, NISfflDE T,SAKURAI K. Realizing fine-grained andflexible access control to outsourced data with attribute-based crypto-systems[C]//Information Security Practice and Experience. Springer,Berlin Heidelberg, 2011: 83-97.
  • 9RUJ S, STOJMENOVIC M, NAYAK A. Decentralized access controlwith anonymous authentication of data stored in clouds[J]. IEEE Trans-actions on Parallel and Distributed Systems, 2014,25(2): 384-394.
  • 10HL7R J, KANG K. Secure data retrieval for decentralized disrup-tion-tolerant military networks [J]. IEEE/ACM Transactions on Net-working, 2014,(22): 16-26.

引证文献3

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部