浏览全部资源
扫码关注微信
1. 中国科学院信息工程研究所,北京 100093
2. 中国科学院大学网络空间安全学院,北京 100049
3. 中国信息安全测评中心,北京 100085
[ "诸天逸(1995- ),男,江苏无锡人,中国科学院信息工程研究所博士生,主要研究方向为跨域访问控制" ]
[ "李凤华(1966- ),男,湖北浠水人,博士,中国科学院信息工程研究所研究员、博士生导师,主要研究方向为网络与系统安全、大数据安全与隐私保护、密码工程" ]
[ "金伟(1994- ),女,北京人,中国科学院信息工程研究所博士生,主要研究方向为大数据访问控制与密钥管理" ]
[ "郭云川(1977- ),男,四川营山人,中国科学院信息工程研究所正研级高工、博士生导师,主要研究方向为访问控制、形式化方法" ]
[ "房梁(1989- ),男,山西太原人,博士,中国科学院信息工程研究所助理研究员,主要研究方向为信息安全、访问控制" ]
[ "成林(1983- ),男,河北邢台人,博士,中国信息安全测评中心助理研究员,主要研究方向为云计算安全、大数据安全" ]
网络出版日期:2020-09,
纸质出版日期:2020-09-25
移动端阅览
诸天逸, 李凤华, 金伟, 等. 互操作性与自治性平衡的跨域访问控制策略映射[J]. 通信学报, 2020,41(9):29-48.
Tianyi ZHU, Fenghua LI, Wei JIN, et al. Cross-domain access control policy mapping mechanism for balancing interoperability and autonomy[J]. Journal on communications, 2020, 41(9): 29-48.
诸天逸, 李凤华, 金伟, 等. 互操作性与自治性平衡的跨域访问控制策略映射[J]. 通信学报, 2020,41(9):29-48. DOI: 10.11959/j.issn.1000-436x.2020157.
Tianyi ZHU, Fenghua LI, Wei JIN, et al. Cross-domain access control policy mapping mechanism for balancing interoperability and autonomy[J]. Journal on communications, 2020, 41(9): 29-48. DOI: 10.11959/j.issn.1000-436x.2020157.
跨域访问控制虽然能提升互操作性,但也可降低域内自治性,因此如何平衡域间互操作性和域内自治性是一个重要的问题。针对该问题,提出一种基于多目标整数规划优化的跨域访问控制策略映射机制。在该机制中,将最大化域间互操作性和最小化域内自治性作为目标函数,将7类典型的跨域冲突作为约束函数,设计了一种带约束的 NSGA-III 优化算法。实验结果表明,在模拟现实机构特征的大中规模数据集上,该算法拥有较快收敛速度,且解集具有较高的准确性。
Cross-domain access control can improves interoperability but reduces intra-domain autonomy.To balance inter-domain interoperability and intra-domain autonomy
a cross-domain access control policy mapping to the problem of multi-objective integer optimization programming was formulated.Both the maximization of inter-domain interoperability and the minimization of intra-domain autonomy were taken as the objectives.Further
seven constraints were designed to prevent typical cross-domain conflicts.To solve the optimization problem
a constrained NSGA-III algorithm was proposed.The experimental results show that the proposed algorithm can quickly converge and accurately find the policy mapping even in the large-scale datasets.
JOSHI J B D , BERTINO E , GHAFOOR A . Temporal hierarchies and inheritance semantics for GTRBAC [C ] // Proceedings of the seventh ACM symposium on Access control models and technologies . New York:ACM Press , 2002 : 74 - 83 .
DU S , JOSHI J B D . Supporting authorization query and inter-domain role mapping in presence of hybrid role hierarchy [C ] // Proceedings of the eleventh ACM symposium on Access control models and technologies . New York:ACM Press , 2006 : 228 - 236 .
ZHANG Y , JOSHI J B D . A request-driven secure interoperation framework in loosely-coupled multi-domain environments employing RBAC policies [C ] // 2007 International Conference on Collaborative Computing:Networking,Applications and Worksharing . Piscataway:IEEE Press , 2007 : 25 - 32 .
SHAHRAKI A S , RUDOLPH C , GROBLER M . A dynamic access control policy model for sharing of healthcare data in multiple domains [C ] // 2019 18th IEEE International Conference On Trust,Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering . Piscataway:IEEE Press , 2019 : 618 - 625 .
UNAL D , ÇAGLAYAN M U . A formal role-based access control model for security policies in multi-domain mobile networks [J ] . Computer Networks , 2013 , 57 ( 1 ): 330 - 350 .
KAPADIA A , MUHTADI J A , CAMPBELL R H , et al . IRBAC2000:secure interoperability using dynamic role translation [C ] // Proceedings of the International Conference on Internet Computing . Saarland:DBLP , 2000 : 231 - 238 .
AL-MUHTADI J , KAPADIA A , CAMPBELL R , et al . The A-IRBAC 2000 model:administrative interoperable role-based access control [R ] . Urbana-Champaign:University of Illinois ,(2001-01)[2020-05-08 ] .
SHEHAB M , BERTINO E , GHAFOOR A . SERAT:secure role mapping technique for decentralized secure interoperability [C ] // Proceedings of the tenth ACM symposium on Access control models and technologies . New York:ACM Press , 2005 : 159 - 167 .
SHAFIQ B , JOSHI J B D , BERTINO E , et al . Secure interoperation in a multidomain environment employing RBAC policies [J ] . IEEE Transactions on Knowledge and Data Engineering , 2005 , 17 ( 11 ): 1557 - 1577 .
FAN K , BAI Y , XU H , et al . A secure cross-domain access control scheme in social networks [C ] // IEEE International Conference on Communications . Piscataway:IEEE Press , 2019 : 1 - 6 .
DIAO L , WANG H , ALSARRA S , et al . A smart role mapping recommendation system [C ] // 2019 IEEE 43rd Annual Computer Software and Applications Conference . Piscataway:IEEE Press , 2019 ,( 2 ): 135 - 140 .
DIAZ-LOPEZ D , DOLERA-TORMO G , GOMEZ-MARMOL F , et al . Managing XACML systems in distributed environments through meta-policies [J ] . Computers & Security , 2015 ( 48 ): 92 - 115 .
ZHANG Q F , LI H . MOEA/D:a multiobjective evolutionary algorithm based on decomposition [J ] . IEEE Transactions on evolutionary computation , 2007 , 11 ( 6 ): 712 - 731 .
DAS I , DENNIS J E . Normal-boundary intersection:a new method for generating the pareto surface in nonlinear multicriteria optimization problems [J ] . SIAM journal on optimization , 1998 , 8 ( 3 ): 631 - 657 .
0
浏览量
579
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构