Access Process of Data-Flow in Cross-Domain Usage Control Model Based on XACML

被引:0
作者
Dai, Changying [1 ,2 ]
Gong, Wentao [2 ]
Liu, Jing [1 ]
机构
[1] China Univ Petr, Sch Comp & Commun Engn, Dong Ying, Peoples R China
[2] China Univ Petr, Network Informat & Educ Technol Ctr, Dong Ying, Peoples R China
来源
SMART MATERIALS AND INTELLIGENT SYSTEMS, PTS 1 AND 2 | 2011年 / 143-144卷
关键词
access process; xacml; cross-domain; usage control;
D O I
10.4028/www.scientific.net/AMR.143-144.1275
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the rapid development of information technology, more and more requesters need accessing the services in different access domains, which make the access process in cross-domain become more difficultly. The traditional access control models couldn't solve the access process for their design limitations and diversity access policies. Usage control model (UCON) was proposed to strengthen the expression of access control model, but UCON is only a conceptual model. How to use the UCON in access process'? It is worthwhile to further study. Extensible access control markup language (XACML) is an open standard XML-based language, which can be used to describe the security policy. In order to solve the access process in different access domains, based on XACML, access process of data-flow in cross-domain usage control model is proposed in the paper. Access process of data-flow cross different domains in XACML is introduced to solve the cross-domain problem. Finally, a small example is given to verify the effectiveness of access process.
引用
收藏
页码:1275 / +
页数:2
相关论文
共 10 条
  • [1] [Anonymous], 2003, EXTENSIBLE ACC CONTR, P4
  • [2] Dai CY, 2010, 2010 2ND INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY (EBISS 2010), P85
  • [3] Park J., 2004, ACM Transactions on Information and Systems Security, V7, P128, DOI 10.1145/984334.984339
  • [4] Originator control in usage control
    Park, J
    Sandhu, R
    [J]. THIRD INTERNATION WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS, 2002, : 60 - 66
  • [5] Security architectures for controlled digital information dissemination
    Park, J
    Sandhu, R
    Schifalacqua, J
    [J]. 16TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2000, : 224 - 233
  • [6] Park J., 2002, P 7 ACM S ACCESS CON, P57, DOI DOI 10.1145/507711.507722
  • [7] Role based access control models
    Sandhu, RS
    Coyne, EJ
    Feinstein, HL
    Youman, CE
    [J]. COMPUTER, 1996, 29 (02) : 38 - &
  • [8] Xinwen Zhang, 2006, THESIS G MASON U FAI, P3
  • [9] Zhang GP, 2009, 2009 INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2009), VOLUMES 1 AND 2, P821
  • [10] Zhang Xinwen, 2006, ACM ASIACCS 06 MARCH