Action-based multi-level access control model

被引:0
|
作者
Su, Mang [1 ]
Li, Fenghua [2 ]
Shi, Guozhen [3 ]
机构
[1] State Key Laboratory of Integrated Services Network, Xidian University, Xi'an,710071, China
[2] State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing,100093, China
[3] Department of Information Security, Beijing Electronic Science and Technology Institute, Beijing,100070, China
关键词
Multimedia systems - Problem solving - Environmental management - Specifications;
D O I
10.7544/issn1000-1239.2014.20131717
中图分类号
学科分类号
摘要
The developments of communication, computer, and multimedia technologies have speeded up information transmission. The information has been becoming multi-dimensional. The multi-level security could not only ensure the correctness of information transmission, but also keep the integrality and confidentiality of the data. The traditional multi-level security models have been implemented with the classic access control models, such as RBAC (role-based access control), which solve the problems of multi-level access control to some extent. But they could not accommodate the users' requirements of multi-level permission management at anytime and anywhere with the consideration of the temporal and environmental factors in the existing multi-level security access control mechanisms. How to implement the multi-level access control with the consideration of time and environment has become a problem to be solved. Firstly, we present an action-based multi-level access control model, which integrates the BLP and ABAC (action-based access control) together by extending the security level to action. Secondly, in order to solve the problem of permission specification with time and environment, we make the description of security level more detailed by defining the reading level (lr) and writing level (lw). The corresponding security rules and proof have been given. Finally, we give the implementing scheme of our model. By integrating the temporal state and environmental state together for the current complicated network, our scheme could solve the problems of the multi-level management and access control.
引用
收藏
页码:1604 / 1613
相关论文
共 50 条
  • [1] An Action Based Access Control Model for Multi-level Security
    Su, Mang
    Li, Fenghua
    Shi, Guozhen
    Li, Li
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2012, 6 (02): : 359 - 366
  • [2] Action-based access control model
    Li Fenghua
    Wang Wei
    Ma Jianfeng
    Moon, SangJae
    CHINESE JOURNAL OF ELECTRONICS, 2008, 17 (03): : 396 - 401
  • [3] Action-based access control model and administration of actions
    Key Laboratory of Computer Networks and Information Security, Xidian University, Xi'an 710071, China
    不详
    Tien Tzu Hsueh Pao, 2008, 10 (1881-1890):
  • [4] Action-Based Access Control for Web Services
    Li, Fenghua
    Wang, Wei
    Ma, Jianfeng
    Su, Haoxin
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 637 - 642
  • [5] a Multi-Level Dynamic Access Control Model and Its Formalization
    Zhou, Yanjie
    Ma, Li
    Wen, Min
    2015 2ND INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CONTROL ENGINEERING ICISCE 2015, 2015, : 23 - 27
  • [6] Action-based multilevel access control for structured document
    Xiong, J. (jinbo810@163.com), 1600, Science Press (50):
  • [7] A Multi-Level Cross-Domain Access Control Model Based On Role Mapping
    Lv, Bin
    Zhang, Di
    Mao, Rui
    Yang, Haitian
    PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON MECHANICAL MATERIALS AND MANUFACTURING ENGINEERING (MMME 2016), 2016, 79 : 230 - 235
  • [8] Multi-level access control for collaborative CAD
    Fang, CH
    Peng, W
    Ye, XZ
    Zhang, SY
    PROCEEDINGS OF THE NINTH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, VOLS 1 AND 2, 2005, : 643 - 648
  • [9] Multi-level Access Control for Geo Contents
    Park, Sun Rae
    Lee, Jong Suk Ruth
    Cho, Kum Won
    Lee, Kyu-Chul
    CONTROL AND AUTOMATION, AND ENERGY SYSTEM ENGINEERING, 2011, 256 : 183 - +
  • [10] BC-BLPM: A Multi-Level Security Access Control Model Based on Blockchain Technology
    Xiang Yu
    Zhangxiang Shu
    Qiang Li
    Jun Huang
    中国通信, 2021, 18 (02) : 110 - 135