DAC (Discretionary Access Control Policy) is access control based on ownership relations between subject and object, the subject can discretionarily decide on that who, by what methods, can access his owns object. I...DAC (Discretionary Access Control Policy) is access control based on ownership relations between subject and object, the subject can discretionarily decide on that who, by what methods, can access his owns object. In this paper, the system time is looked as a basic secure element. The DAC_T (Discretionary Access Control Policy with Time Character) is presented and formalized. The DAC_T resolves that the subject can discretionarily decide that who, on when, can access his owns objects. And then the DAC_T is implemented on Linux based on GFAC (General Framework for Access Control), and the algorithm is put forward. Finally, the performance analysis for the DAC T Linux is carried out. It is proved that the DAC T Linux not only can realize time constraints between subject and object but also can still be accepted by us though its performance have been decreased.展开更多
针对云计算的特点和安全需求对比分析当前流行的访问控制技术,以基于行为的访问控制和基于任务的访问控制模型的为参考,提出了一种基于任务行为的访问控制模型TABAC(Task-Action-Based Access Control Model),实现基于行为的访...针对云计算的特点和安全需求对比分析当前流行的访问控制技术,以基于行为的访问控制和基于任务的访问控制模型的为参考,提出了一种基于任务行为的访问控制模型TABAC(Task-Action-Based Access Control Model),实现基于行为的访问控制模型和工作流的有机结合。经过安全分析,该模型不仅能实现安全的访问控制,而且适应云计算环境动态性、异构性的特点。通过特征比较,表明该模型具有较好地实用性,较好地实现了当前云环境的安全需求。展开更多
According to analyze the facade phenomenon of wire-less sensor networks(WSNs),this paper proposes a feasible method to state clearly and improve the power control efficiency of wire-less sensor networks(WSNs). One...According to analyze the facade phenomenon of wire-less sensor networks(WSNs),this paper proposes a feasible method to state clearly and improve the power control efficiency of wire-less sensor networks(WSNs). One of the crucial problems for WSNs is the design of medium access control (MAC) protocol. Our method want to adjust the activities of the MAC protocols control to achieve the enery conservation when the wireless communication module of sensor nodes is running, which is the major consumer of energy consumed by sensors energy. The energy efficiency of MAC protocol makes a strong impact on the network performance. To some extent,our research work describes and analyze the sources of energy consumption in MAC layer and simultaneously present an optimal method for the design of MAC protocol. Then we discusses some factors impacting on the performance of MAC protocol and metrics of performance evaluation. Eventually, the coming research direction is summarized.展开更多
针对物联网中设备资源受限、连接数量大、动态性强等特点,传统的集中式访问控制技术已不完全适用,如何在物联网环境中实现安全高效的访问控制授权成为亟待解决的关键问题.对此,提出一种基于层级区块链的物联网分布式体系架构(distribute...针对物联网中设备资源受限、连接数量大、动态性强等特点,传统的集中式访问控制技术已不完全适用,如何在物联网环境中实现安全高效的访问控制授权成为亟待解决的关键问题.对此,提出一种基于层级区块链的物联网分布式体系架构(distributed architecture based on hierarchical blockchain for Internet of things,DAHB).在该架构中以基于属性的访问控制(attribute-based access control,ABAC)模型为基础,采用智能合约的方式实现对物联网设备基于属性的域内和跨域的灵活、动态、自动化的访问控制.同时,在属性度量中增加信任值与诚实度动态评估不同域间和设备间的信任关系,保证实体能够履行合约的信用能力和稳定性.理论分析和实验结果表明:该方案比现有方案更有效解决物联网访问控制中存在的轻量级、灵活性、细粒度和安全性问题.展开更多
基金Supported by the National 863 Broad Band VPN Project (No.863-104-03-01)
文摘DAC (Discretionary Access Control Policy) is access control based on ownership relations between subject and object, the subject can discretionarily decide on that who, by what methods, can access his owns object. In this paper, the system time is looked as a basic secure element. The DAC_T (Discretionary Access Control Policy with Time Character) is presented and formalized. The DAC_T resolves that the subject can discretionarily decide that who, on when, can access his owns objects. And then the DAC_T is implemented on Linux based on GFAC (General Framework for Access Control), and the algorithm is put forward. Finally, the performance analysis for the DAC T Linux is carried out. It is proved that the DAC T Linux not only can realize time constraints between subject and object but also can still be accepted by us though its performance have been decreased.
文摘针对云计算的特点和安全需求对比分析当前流行的访问控制技术,以基于行为的访问控制和基于任务的访问控制模型的为参考,提出了一种基于任务行为的访问控制模型TABAC(Task-Action-Based Access Control Model),实现基于行为的访问控制模型和工作流的有机结合。经过安全分析,该模型不仅能实现安全的访问控制,而且适应云计算环境动态性、异构性的特点。通过特征比较,表明该模型具有较好地实用性,较好地实现了当前云环境的安全需求。
基金the National Natural Science Foundation of China (90612014)the National High-Technology Research and Development Program of China (863 Program)(2006AA01Z101)
文摘According to analyze the facade phenomenon of wire-less sensor networks(WSNs),this paper proposes a feasible method to state clearly and improve the power control efficiency of wire-less sensor networks(WSNs). One of the crucial problems for WSNs is the design of medium access control (MAC) protocol. Our method want to adjust the activities of the MAC protocols control to achieve the enery conservation when the wireless communication module of sensor nodes is running, which is the major consumer of energy consumed by sensors energy. The energy efficiency of MAC protocol makes a strong impact on the network performance. To some extent,our research work describes and analyze the sources of energy consumption in MAC layer and simultaneously present an optimal method for the design of MAC protocol. Then we discusses some factors impacting on the performance of MAC protocol and metrics of performance evaluation. Eventually, the coming research direction is summarized.
文摘针对物联网中设备资源受限、连接数量大、动态性强等特点,传统的集中式访问控制技术已不完全适用,如何在物联网环境中实现安全高效的访问控制授权成为亟待解决的关键问题.对此,提出一种基于层级区块链的物联网分布式体系架构(distributed architecture based on hierarchical blockchain for Internet of things,DAHB).在该架构中以基于属性的访问控制(attribute-based access control,ABAC)模型为基础,采用智能合约的方式实现对物联网设备基于属性的域内和跨域的灵活、动态、自动化的访问控制.同时,在属性度量中增加信任值与诚实度动态评估不同域间和设备间的信任关系,保证实体能够履行合约的信用能力和稳定性.理论分析和实验结果表明:该方案比现有方案更有效解决物联网访问控制中存在的轻量级、灵活性、细粒度和安全性问题.