Journal on CommunicationsVol. 37, Issue 11, Pages: 49-56(2016)
作者机构:
1. 北京电子科技学院信息安全系,北京 100070
2. 西安电子科技大学计算机学院,陕西 西安 710071
3. 西安电子科技大学通信工程学院,陕西 西安 710071
4. 瑞庭网络技术(上海)有限公司房产技术部,上海 200127
5. 中国科学院信息工程研究所信息安全国家重点实验室,北京 100093
作者简介:
基金信息:
The National Key Research Program of China(2016YFB0800304);The Natural Science Foundation of Beijing(4152048);The Natural Science Foundation of Jiangsu Province(BK20150787)
With the development of cloud computing technology
smart city and mobile office and emergence of mobile smart devices
the resources' environment is increasing complex. The traditional access control model has been difficult to meet the diverse access control requirements and the dynamic and adaptive access control policy. A dynamic and adap-tive access control model combining the resource life cycle management based on ABAC was proposed. The model fo-cused on resource life cycle management considering the relevance of the resource life cycle management and access control policy. In this model
the policy can be changed as the resource life cycle states' change
so the applicability has been improved. In addition
the user access behavior history management function was added in this model
which can adapt the environment better by considering history of user access behavior. At last
the model in general and cloud com-puting access control system was implemented and verified.
关键词
Keywords
references
SANDHU R S , COYNE E J , FEINSTEIN H L , et al . Role-based access control models [J ] . Computer , 1996 , 29 ( 2 ): 38 - 47 .
SANDHU R , BHAMIDIPATI V , MUNAWER Q . The ARBAC97 model for role-based administration of roles [J ] . ACM Transactions on Information & System Security , 1999 , 2 ( 1 ): 105 - 135 .
LI F H , SU M , SHI G Z , et al . Research status and development trends of access control model [J ] . Acta Electronica Sinica , 2012 , 40 ( 4 ): 805 - 813 .
RANISE S , TRUONG A , ARMANDO A . Scalable and precise auto-mated analysis of administrative temporal role-based access con-trol [C ] // ACM Symposium on Access Control Models and Technolo-gies. ACM , 2014 : 103 - 114 .
XU D , KENT M , THOMAS L , et al . Automated model-based testing of role-based access control using predicate/transition nets [J ] . IEEE Transactions on Computers , 2015 , 64 ( 9 ): 2490 - 2505 .
STOLLER S D , YANG P , GOFMAN M I , et al . Symbolic reachability analysis for parameterized administrative role-based access con-trol [C ] // ACM Symposium on Access Control Models and Technolo-gies. ACM . 2009 : 148 - 164 .
UZUN E , ATLURI V , VAIDYA J , et al . Security analysis for temporal role based access control [J ] . Uzun Emre , 2014 , 22 ( 6 ): 177 - 186 .
BERTINO E , BONATTI P A , FERRARI E . TRBAC: a temporal role-based access control model [J ] . ACM Transactions on Information& System Security , 2001 , 4 ( 3 ): 191 - 233 .
SHARMA M , SURAL S , VAIDYA J , et al . AMTRAC: an administra-tive model for temporal role-based access control [J ] . Computers &Security , 2013 , 39 ( 39 ): 201 - 218 .
TOAHCHOODEE M , RAY I . On the formalization and analysis of a spatio-temporal role-based access control model [C ] // IFIP Wg 11.3 Working Conference on Data and Applications Security. Springer-Verlag , 2008 : 399 - 452 .
TAN Z Y , LIU D , SI T G , et al . A multilevel security model with credibil-ity characteristics [J ] . Acta Electronica Sinica , 2008 , 36 ( 8 ): 1637 - 1641 .
BO L , CHUNXIA J , YILIN L . A user access policy based on dynamic sensitivity label [C ] // Network Computing and Information Security, International Conference on IEEE . 2011 : 13 - 16 .
LI F H , WANG W , MA J F , et al . Action-based access control model and administration of actions [J ] . Acta Electronica Sinica , 2008 , 36 ( 10 ): 1881 - 1890 .