浏览全部资源
扫码关注微信
1. 中国科学院信息工程研究所信息安全国家重点实验室,北京 100093
2. 中国科学院大学网络空间安全学院,北京 100049
3. 杭州电子科技大学网络空间安全学院,浙江 杭州 310018
4. 中国电子科技集团公司第五十四研究所,河北 石家庄 050081
5. 北京电子科技学院信息安全系,北京 100070
[ "李凤华(1966-),男,湖北浠水人,博士,中国科学院信息工程研究所副总工程师、研究员、博士生导师,主要研究方向为网络与系统安全、信息保护、隐私计算。" ]
[ "陈天柱(1987-),男,河北秦皇岛人,中国科学院信息工程研究所博士生,主要研究方向为信息安全。" ]
[ "王震(1984-),男,山东聊城人,博士,杭州电子科技大学副研究员、硕士生导师,主要研究方向为网络与系统安全、博弈论。" ]
[ "张林杰(1972-),女,河北乐亭人,中国电子科技集团公司第五十四研究所研究员,主要研究方向为网络安全、通信网络与系统。" ]
[ "史国振(1974-),男,河南济源人,博士,北京电子科技学院副教授、硕士生导师,主要研究方向为网络安全、嵌入式系统、访问控制。" ]
[ "郭云川(1977-),男,四川营山人,博士,中国科学院信息工程研究所副研究员,主要研究方向为物联网安全、形式化方法。" ]
网络出版日期:2018-02,
纸质出版日期:2018-02-25
移动端阅览
李凤华, 陈天柱, 王震, 等. 复杂网络环境下跨网访问控制机制[J]. 通信学报, 2018,39(2):1-10.
Fenghua LI, Tianzhu CHEN, Zhen WANG, et al. Cross-network access control mechanism for complex network environment[J]. Journal on communications, 2018, 39(2): 1-10.
李凤华, 陈天柱, 王震, 等. 复杂网络环境下跨网访问控制机制[J]. 通信学报, 2018,39(2):1-10. DOI: 10.11959/j.issn.1000-436x.2018019.
Fenghua LI, Tianzhu CHEN, Zhen WANG, et al. Cross-network access control mechanism for complex network environment[J]. Journal on communications, 2018, 39(2): 1-10. DOI: 10.11959/j.issn.1000-436x.2018019.
以天地一体化网络、物联网和复杂专用网络为代表的复杂网络环境(CNN
complex network environment)具有设备动态接入,网络异构、众多和信息跨网流动频繁等特点。上述特点给复杂网络环境下的访问控制技术带来细粒度控制、策略跟随和策略语义归一化等一系列新需求。针对这些需求,将面向网络空间的访问控制机制映射到复杂网络环境中。首先展示访问控制机制的具体映射过程,其次提出相应的访问控制管理模型,并用Z符号形式化地描述管理模型中的管理函数。实例分析表明,该访问控制机制可满足上述一系列新需求。
Complex network environments
such as space-ground integrated networks
internet of things and complex private networks
have some typical characteristics
e.g.
integration of multi-network and information flow in cross-network.These characteristics bring access control for complex network environment the new requirement of coarse-grained control
sticky policies and inconsistent operation semantics.To satisfy these requirements
cross-network access control mechanism in complex network environments (CACCN) was designed by mapping the cyberspace-oriented access control.First of all
the process of mapping was illustrated using the example of space-ground integrated networks.Next
a management model was proposed to manage the control elements in CACCN and a series of management functions were designed by using Z-notation.The analysis on practical example demonstrates that the mechanism can satisfy a series of access control requirements.
沈荣骏 . 我国天地一体化航天互联网构想 [J ] . 中国工程科学 , 2006 , 8 ( 10 ): 19 - 30 .
SHEN R J . Some thoughts of (Chinese) integrated space-ground network system [J ] . Engineering Science , 2006 , 8 ( 10 ): 19 - 30 .
GUBBI J , BUYYA R , MARUSIC S , et al . Internet of things (IoT):a vision,architectural elements,and future directions [J ] . Future Generation Computer Systems , 2013 , 29 ( 7 ): 1645 - 1660 .
张蓉 , 徐晔 , 闵小峰 . 美协会发表2016年卫星产业状况报告 [J ] . 中国航天 , 2016 , 8 : 38 - 44 .
ZHANG R , XU Y , MIN X F . 2016 SIA state of the satellite industry report [J ] . Aerospace China , 2016 , 8 : 38 - 44 .
ANGGOROJATI B , MAHALLE P , PRASAO N R , et al . Capability-based access control delegation model on the federated IoT network [C ] // Symposium on Wireless Personal Multimedia Communications . 2012 : 604 - 608 .
GUSMEROLI S , PICCIONE S , ROTONDI D . IoT access control issues:a capability based approach [C ] // The IEEE International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing . 2012 : 787 - 792 .
GUSMEROLI S , PICCIONE S , ROTONDI D . A capability-based security approach to manage access control in the internet of things [J ] . Mathematical and Computer Modelling , 2013 , 58 ( 5 ): 1189 - 1205 .
SAMARATI P , VIMERCATI S D C D . Access control:policies,models,and mechanisms [C ] // International School on Foundations of Security Analysis and Design . 2000 : 137 - 196 .
CHEUNG H , YANG C , et al . New smart-grid operation-based network access control [C ] // The IEEE International Conference on Energy Conversion Congress and Exposition . 2015 : 1203 - 1207 .
FERRAIOLO D F , SANDHU R , GAVRILA S , et al . Proposed NIST standard for role-based access control [J ] . ACM Transactions on Information and System Security , 2001 , 4 ( 3 ): 224 - 274 .
BERNABE B , RAMOS J , GOMEZ A F S , et al . TACIoT:multidimensional trust-aware access control system for the Internet of Things [J ] . Soft Computing , 2016 , 20 ( 5 ): 1763 - 1779 .
GRANDISON T , SLOMAN M . A survey of trust in internet applications [J ] . IEEE Communications Surveys & Tutorials , 2000 , 3 ( 4 ): 2 - 16 .
封孝生 , 刘德生 , 乐俊 , 等 . 临近空间信息资源访问控制策略初探 [J ] . 计算机应用研究 , 2008 , 25 ( 12 ): 3702 - 3704 .
FENG X S , LIU D S , YUE J , et al . Exploration on access control to near space information resources [J ] . Application Research of Computers , 2008 , 25 ( 12 ): 3702 - 3704 .
HUR J , NOH D K . Attribute-based access control with efficient revocation in data outsourcing systems [J ] . IEEE Transactions on Parallel and Distributed Systems , 2011 , 22 ( 7 ): 1214 - 1221 .
QI H , MA H , LI J , et al . Access control model based on role and attribute and its applications on space-ground integration networks [C ] // The IEEE International Conference on Computer Science and Network Technology . 2015 : 1118 - 1122 .
KULKARNI D , TRIPATHI A . Context-aware role-based access control in pervasive computing systems [C ] // The ACM Symposium on Access Control Models and Technologies . 2008 : 113 - 122 .
李凤华 , 王彦超 , 殷丽华 , 等 . 面向网络空间的访问控制模型 [J ] . 通信学报 , 2016 , 37 ( 5 ): 9 - 20 .
LI F H , WANG Y C , YIN L H , et al . Novel cyberspace-oriented access control model [J ] . Journal on Communications , 2016 , 37 ( 5 ): 9 - 20 .
DORNYEI Z . Motivational strategies in the language classroom [M ] . Cambridge : Cambridge University PressPress , 2001 .
SANDHU R S , COYNE E J . Role-based access control models [J ] . Computer , 1996 , 29 ( 2 ): 38 - 47 .
0
浏览量
1567
下载量
4
CSCD
关联资源
相关文章
相关作者
相关机构