浏览全部资源
扫码关注微信
1. 北京电子科技学院信息安全系,北京 100070
2. 西安电子科技大学计算机学院,陕西 西安 710071
3. 西安电子科技大学通信工程学院,陕西 西安 710071
4. 瑞庭网络技术(上海)有限公司房产技术部,上海 200127
5. 中国科学院信息工程研究所信息安全国家重点实验室,北京 100093
[ "史国振(1974-),男,河南济源人,博士,北京电子科技学院副教授、硕士生导师,主要研究方向为网络与系统安全、嵌入式安全。" ]
[ "王豪杰(1991-),男,山东青岛人,西安电子科技大学硕士生,主要研究方向为访问控制与网络安全。" ]
[ "慈云飞(1989-),男,安徽池州人,北京电子科技学院硕士生,主要研究方向为访问控制和信息安全。" ]
[ "叶思水(1989-),男,江西南昌人,瑞庭网络技术(上海)有限公司技术员,主要研究方向为网络安全。" ]
[ "郭云川(1977-),男,四川营山人,博士,中国科学院信息工程研究所副研究员,主要研究方向为物联网安全、形式化方法。" ]
网络出版日期:2016-11,
纸质出版日期:2016-11-25
移动端阅览
史国振, 王豪杰, 慈云飞, 等. 动态自适应访问控制模型[J]. 通信学报, 2016,37(11):49-56.
Guo-zhen SHI, Hao-jie WANG, Yun-fei CI, et al. Dynamic and adaptive access control model[J]. Journal on communications, 2016, 37(11): 49-56.
史国振, 王豪杰, 慈云飞, 等. 动态自适应访问控制模型[J]. 通信学报, 2016,37(11):49-56. DOI: 10.11959/j.issn.1000-436x.2016220.
Guo-zhen SHI, Hao-jie WANG, Yun-fei CI, et al. Dynamic and adaptive access control model[J]. Journal on communications, 2016, 37(11): 49-56. DOI: 10.11959/j.issn.1000-436x.2016220.
随着云计算技术、智慧城市及移动办公的发展和移动智能设备的出现,资源所处的网络环境越来越复杂,传统的访问控制模型已很难满足多样化的访问控制条件以及访问控制策略动态自适应调整的需求。以基于行为的访问控制模型为基础,结合资源生命周期管理,提出了一种动态自适应访问控制模型。该模型以资源生命周期为中心,充分考虑资源的生命周期阶段及其访问控制策略的关联性和动态性,使资源访问控制策略能够随着资源生命周期所处阶段的变化而自动变化,提高了访问控制的灵活性和复杂网络环境下的适用性;模型加入用户访问行为历史管理功能,考虑用户的历史访问行为,进一步约束主体的访问能力,提高模型适应开放的网络环境的能力。最后,在通用访问控制系统和云访问控制系统中对该模型进行了实现和验证。
With the development of cloud computing technology
smart city and mobile office and emergence of mobile smart devices
the resources' environment is increasing complex. The traditional access control model has been difficult to meet the diverse access control requirements and the dynamic and adaptive access control policy. A dynamic and adap-tive access control model combining the resource life cycle management based on ABAC was proposed. The model fo-cused on resource life cycle management considering the relevance of the resource life cycle management and access control policy. In this model
the policy can be changed as the resource life cycle states' change
so the applicability has been improved. In addition
the user access behavior history management function was added in this model
which can adapt the environment better by considering history of user access behavior. At last
the model in general and cloud com-puting access control system was implemented and verified.
SANDHU R S , COYNE E J , FEINSTEIN H L , et al . Role-based access control models [J ] . Computer , 1996 , 29 ( 2 ): 38 - 47 .
SANDHU R , BHAMIDIPATI V , MUNAWER Q . The ARBAC97 model for role-based administration of roles [J ] . ACM Transactions on Information & System Security , 1999 , 2 ( 1 ): 105 - 135 .
李凤华 , 苏铓 , 史国振 , 等 . 访问控制模型研究进展及发展趋势 [J ] . 电子学报 , 2012 , 40 ( 4 ): 805 - 813 .
LI F H , SU M , SHI G Z , et al . Research status and development trends of access control model [J ] . Acta Electronica Sinica , 2012 , 40 ( 4 ): 805 - 813 .
RANISE S , TRUONG A , ARMANDO A . Scalable and precise auto-mated analysis of administrative temporal role-based access con-trol [C ] // ACM Symposium on Access Control Models and Technolo-gies. ACM , 2014 : 103 - 114 .
XU D , KENT M , THOMAS L , et al . Automated model-based testing of role-based access control using predicate/transition nets [J ] . IEEE Transactions on Computers , 2015 , 64 ( 9 ): 2490 - 2505 .
STOLLER S D , YANG P , GOFMAN M I , et al . Symbolic reachability analysis for parameterized administrative role-based access con-trol [C ] // ACM Symposium on Access Control Models and Technolo-gies. ACM . 2009 : 148 - 164 .
UZUN E , ATLURI V , VAIDYA J , et al . Security analysis for temporal role based access control [J ] . Uzun Emre , 2014 , 22 ( 6 ): 177 - 186 .
BERTINO E , BONATTI P A , FERRARI E . TRBAC: a temporal role-based access control model [J ] . ACM Transactions on Information& System Security , 2001 , 4 ( 3 ): 191 - 233 .
SHARMA M , SURAL S , VAIDYA J , et al . AMTRAC: an administra-tive model for temporal role-based access control [J ] . Computers &Security , 2013 , 39 ( 39 ): 201 - 218 .
TOAHCHOODEE M , RAY I . On the formalization and analysis of a spatio-temporal role-based access control model [C ] // IFIP Wg 11.3 Working Conference on Data and Applications Security. Springer-Verlag , 2008 : 399 - 452 .
谭智勇 , 刘铎 , 司天歌 , 等 . 一种具有可信度特征的多级安全模型 [J ] . 电子学报 , 2008 , 36 ( 8 ): 1637 - 1641 .
TAN Z Y , LIU D , SI T G , et al . A multilevel security model with credibil-ity characteristics [J ] . Acta Electronica Sinica , 2008 , 36 ( 8 ): 1637 - 1641 .
BO L , CHUNXIA J , YILIN L . A user access policy based on dynamic sensitivity label [C ] // Network Computing and Information Security, International Conference on IEEE . 2011 : 13 - 16 .
李凤华 , 王巍 , 马建峰 , 等 . 基于行为的访问控制模型及其行为管理 [J ] . 电子学报 , 2008 , 36 ( 10 ): 1881 - 1890 .
LI F H , WANG W , MA J F , et al . Action-based access control model and administration of actions [J ] . Acta Electronica Sinica , 2008 , 36 ( 10 ): 1881 - 1890 .
李良军 . PLM 中权限控制的研究与设计 [D ] . 西安: 西安电子科技大学 , 2012 .
LI L J . Research and design of access-control in product lifecycle management (PLM) [D ] . Xi'an: Xidian University , 2012 .
0
浏览量
1154
下载量
1
CSCD
关联资源
相关文章
相关作者
相关机构