期刊文献+

基于区块链和策略分级的访问控制模型 被引量:4

Access control based on block chain and policy grading
下载PDF
导出
摘要 为应对当前访问控制动态变化、策略合约安全性以及策略检索效率的需求,以属性访问控制模型(ABAC)为基础,提出一种基于区块链和策略分级访问控制模型BP-ABAC。结合ABAC和区块链技术,使访问控制策略通过智能合约的方式储存在区块链,合约中对访问控制策略进行策略分级;用户根据等级评估获得相应策略集的访问权限;当请求属性和策略集中的策略相匹配时,获得访问资源权限。实验结果表明,该模型实现了对不同用户访问权限控制和提高访问控制的效率与灵活性,加强了访问控制策略的安全性和隐私性。 To meet the current access control dynamic changes,policy contract security and policy retrieval efficiency requirements,on the basis of attribute access control model(ABAC),a hierarchical access control model based on block chain and policy was proposed,namely BP-ABAC.Combined with ABAC and block chain technology,the access control strategy was stored in the block chain by intelligent contract.The user obtained the access rights of the corresponding policy set according to the level evaluation.Access resource permissions were obtained when the request attribute matched the policy in the policy set.Experimental results show that the proposed model can control access rights of different users and improve the efficiency and flexibility of access control,and enhance the security and privacy of access control policies.
作者 王静宇 杨力 WANG Jing-yu;YANG Li(School of Information Engineering,Inner Mongolia University of Science and Technology,Baotou 014010,China)
出处 《计算机工程与设计》 北大核心 2022年第5期1232-1239,共8页 Computer Engineering and Design
基金 国家自然科学基金项目(61662056) 内蒙古自然科学基金项目(2020MS06009)。
关键词 区块链 智能合约 访问控制 策略分级 等级评估 block chain smart contract access control policy classification level evaluation
  • 相关文献

参考文献12

二级参考文献107

  • 1洪帆,饶双宜,段素娟.基于属性的权限—角色分配模型[J].计算机应用,2004,24(B12):153-155. 被引量:6
  • 2袁禄来,曾国荪,王伟.基于Dempster-Shafer证据理论的信任评估模型[J].武汉大学学报(理学版),2006,52(5):627-630. 被引量:17
  • 3庞辽军,李慧贤,王育民.基于LUC密码体制防欺诈的秘密共享方案[J].电子科技大学学报,2007,36(1):108-111. 被引量:3
  • 4American national standard for information technology-role based access control[S].New York:American National Standards Institute,2004.
  • 5Cheung H,Li Celia,Yu Ye,et al.Privacy protection for role-based access control in service oriented architecture[J].International Journal of Network Security & Its Applications,2014,6(3):1-17.
  • 6Ma Li,Zhou Yanjie,Duan Wei.Extended RBAC model with task-constraint rules[J].Future Information Technology Lecture Notes in Electrical Engineering,2014,276(1):245-250.
  • 7Kuhn D R,Coyne E J,Weil T R.Adding attributes to role-based access control[J].IEEE Computer,2010,43(6):79-81.
  • 8Jin Xin,Sandhu R,Krishnan R.RABAC:role-centric attribute-based access control[C]//Proc of the 6th International Conference on Mathematical Methods,Models and Architectures for Computer Network Security.Berlin:Springer,2012:84-96.
  • 9Coyne E,Weil T R.ABAC and RBAC:scalable,flexible,and auditable access management[J].IEEE Computer Society,2013,15(6):14-16.
  • 10Jin Xin,Krishnan R,Sandhu R.Reachability analysis for role-based administration of attributes[C]//Proc of ACM Workshop on Digital Identity Management.New York:ACM Press,2013:73-84.

共引文献298

同被引文献33

引证文献4

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部