期刊文献+

面向多媒体社交网络的访问控制模型 被引量:8

Research on the access control model for multimedia social networks
下载PDF
导出
摘要 传统访问控制模型无法满足新兴的多媒体社交网络场景下的用户数量大、动态交互和内容共享等特点.为此,提出了一种基于用户主要社交关系属性,如用户类型、紧密度、内容分享深度和信任度等,面向多媒体社交网络的访问控制模型.通过自定义安全规则及其安全策略冲突消解,有效地解决了数字媒体访问使用和分享传播中的安全问题,适用于多媒体数字版权保护应用的实际需求. Traditional access control models are not suitable for an emerging scenario of Multimedia Social Networks (MSNs),in which there are a large number of users,dynamic interaction and content sharing. The paper proposes an access control model for MSNs,based on users’major social relationships,such as relationship type,compactness,content sharing depth and trust.By the self-defined security rules and their security policies conflict elimination,the model effectively solves the security problem of access control and sharing dissemination on digital media,and it would apply to digital right management applications.
出处 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2014年第6期181-187,共7页 Journal of Xidian University
基金 国家自然科学基金资助项目(61370220 61003234) 河南省科技创新人才计划杰出青年基金资助项目(134100510006) 河南省教育厅科学技术研究重点项目基础研究计划资助项目(13A520240 14A520048)
关键词 多媒体社交网络 访问控制 安全规则 策略冲突 multimedia social networks access control security rules policy conflict
  • 相关文献

参考文献12

  • 1张志勇,裴庆祺,杨林,马建峰.支持验证代理方的远程证明模型及其安全协议[J].西安电子科技大学学报,2009,36(1):58-63. 被引量:6
  • 2Kim K, Hong S, Kim J Y. A Study on Policy-based Access Control Model in SNS [J]. International Journal of Multimedia and Ubiquitous Engineering, 2012, 7(3) : 143-150.
  • 3Park J, Sandhu R, Cheng Y. A User-Aetivity-Centrie Framework for Access Control in Online Social Networks[J]. IEEEInternet Computing, 2011, 15(5): 62-65.
  • 4任方,马建峰,郝选文.物联网感知层一种基于属性的访问控制机制[J].西安电子科技大学学报,2012,39(2):66-72. 被引量:6
  • 5Ali B, Villegas W, Maheswaran M. A Trust Based Approach for Protecting User Data in Social Networks [C]// Proceedings of the 2007 Conference of the Center for Advanced Studies on Collaborative Research. New York: ACM, 2007 : 288-293.
  • 6Kruk S R, Grzonkowski S, Gzella A, et al. D-FOAF: Distributed Identity Management with Access Rights Delegation [M]. Heidelberg: Springer, 2006: 140-154.
  • 7Wang H, Sun L. Trust-involved Access Control in Collaborative Open Social Networks [C] //Proceedings of 4th International Conference on Network and System Security. Piscataway: IEEE, 2010: 239-246.
  • 8Villegas W. A Trust-based Access Control Scheme for Social Networks[D]. Montreal: McGill University , 2008.
  • 9Ding J, Mo L. Enforcement of Role Based Access Control in Social Network Environments [C]//IEEE Sixth International Conference on Software Security and Reliability Companion. Piscataway: IEEE, 2012: 92-101.
  • 10Zhang ZY, Wang KL. A Trust Model for Multimedia Social Networks [J]. Social Networks Analysis and Mining (Springer), 2013, 3(4): 969-979.

二级参考文献26

  • 1王超,朱建明,马建峰.基于组件的软件系统可用性分析[J].西安电子科技大学学报,2004,31(5):781-784. 被引量:9
  • 2ZHANG Huanguo WANG Fan.A Behavior-Based Remote Trust Attestation Model[J].Wuhan University Journal of Natural Sciences,2006,11(6):1819-1822. 被引量:10
  • 3Grawrock D. TCG Specification Architecture Overview Revision 1.4. [EB/OL]. [2007-10-01 ]. https://www. trustedcomputinggroup. org/groups/TCG _ 1 _ 4. Architecture _ Overview. pdf.
  • 4Sadeghi A, Stuble C. Property-based Attestation for Computing Platforms: Caring About Properties, Not Mechanisms [C]//Proceedings of New Security Paradigms Workshop 2004. New York: Association for Computing Machinery, 2004: 67-77.
  • 5Chen L, Landfermann R, Lohr H. A Protocol for Property-based Attestation[C]//Proceedings of the First ACM Workshop on Scalable Trusted Computing. New York: Association for Computing Machinery, 2006: 7-16.
  • 6Haldar V. Semantic Remote Attestation[D]. Irvine: University of California, 2006.
  • 7Seshadri A, Perrig A, Doorn L. SWATT: SoftWare-based ATT-estation for Embedded Devices[C]//Proceedings of 2004 IEEE Symposium on Security and Privacy. Washington: IEEE Computer Society, 2004: 272-282.
  • 8Brickell E, Camenisch J, Chen L. Direct Anonymous Attestation[C]//Proceedings of 2004 ACM Conference on Computer and Communications Security. New York: Association for Computing Machinery, 2004: 132-145.
  • 9Yoshihama S, Ebringer T, Nakamura M, et al. WS-Attestation.. Efficient and Fine-Grained Remote Attestation on Web Services[C]//Proceedings of 2005 IEEE International Conference on Web Services. Washington.. Computer Society, 2005 : 743-750.
  • 10裴庆祺,沈玉龙,马建峰.无线传感器网络安全技术综述[J].通信学报,2007,28(8):113-122. 被引量:93

共引文献10

同被引文献47

  • 1唐杰,梁邦勇,李涓子,王克宏.语义Web中的本体自动映射[J].计算机学报,2006,29(11):1956-1976. 被引量:96
  • 2陈向宜,陈允平,李春艳,邓长虹.构建大电网安全防御体系——欧洲大停电事故的分析及思考[J].电力系统自动化,2007,31(1):4-8. 被引量:56
  • 3沈海波,洪帆.基于属性的授权和访问控制研究[J].计算机应用,2007,27(1):114-117. 被引量:16
  • 4Zhang Z Y. Digital rights management ecosystem and its usage controls: a survey[J]. Int J Digit Content Technol Appl, 2011, 5(3): 255-272.
  • 5Zhang Z Y. Frontier and methodologies on digital rights management for multimedia social networks[J]. Int J Digit Con- tent Technol Appl, 2012, 6(9): 245- 249.
  • 6Zhu W W, Luo C, Wang J F, et al. Multimedia cloud computing[J]. IEEE Signal Proc Mag, 2011, 28(3): 59-69.
  • 7Gadea C, Solomon B, Ionescu B, et al. A collaborative cloud-based multimedia sharing platform for social networking envi- ronments[C] // Proc. of International Conference on Computer Communications and Networks, Maul, HI, USA, Aug, 2011.
  • 8Zou P, Wang C K, Liu Z, et al. A cloud based SIM DRM scheme for the mobile internet [C] // Proceedings of the ACM Conference on Computer and Communications Security, Chicago, USA, Oct, 2010: 759-761.
  • 9Carminati B, Ferrari E, Perego A. Enforcing access control in web-based social networks[J]. ACM Transactions on Infor- mation and System Security, 2009, 13(1): 6.
  • 10Cui J, Wang X. SNS based information authorization delegation mechanism and implementation[C] //Proceedings of 2009 International Conference on Computational Intelligence and Security, 2009: 493-497.

引证文献8

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部