A Lightweight Graph-Based Model for Inter-networking Access Control

被引:0
作者
Kang, Zhongmiao [1 ]
Jiang, Wenting [1 ]
Chen, Yan [1 ]
机构
[1] Guangdong Power Grid Corp, Guangzhou 510000, Guangdong, Peoples R China
来源
CLOUD COMPUTING AND SECURITY, PT IV | 2018年 / 11066卷
关键词
Access control; Privilege management; Graph theory; Networking;
D O I
10.1007/978-3-030-00015-8_51
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In classic operation systems, processes are assigned different privileges according to the resources. The enforcement of privilege differentiation on diverse processes indicates that strict security management on the individual process, whose emphasis on the restriction on respective process, however, may also overlook the security risk among the processes. Specifically, one process can invoke another one and establish a session, during which the privileges of invoked process may be passed to the invoking process (e. g., by the inter-processes requests). Thus, it may result in the abuse of privilege and resource leakage. Moreover, the internetworking of the processes and their relations also complicate the tasks for the regulation on authorized privileges, and those can be obtained by inheritance. The management on the latter case (i. e., the inherited privileges) has not been well considered in the existing access control models, whose implementation also incur large overhead. In this paper, we propose a lightweight graph-based access control model to manage the privileges between the networked processes, which provides a general solution for the pervasive applicabilities such as process inter-invoking and network-based access control.
引用
收藏
页码:589 / 597
页数:9
相关论文
共 13 条
[1]  
Bijon KZ, 2013, IEEE CONF COMM NETW, P462, DOI 10.1109/CNS.2013.6682761
[2]   Semantic web-based social network access control [J].
Carminati, Barbara ;
Ferrari, Elena ;
Heatherly, Raymond ;
Kantarcioglu, Murat ;
Thuraisingham, Bhavani .
COMPUTERS & SECURITY, 2011, 30 (2-3) :108-115
[3]   Fuzzy multi-level security : An experiment on quantified risk-adaptive access control - Extended abstract [J].
Cheng, Pau-Chen ;
Rohatgi, Pankaj ;
Keser, Claudia ;
Karger, Paul A. ;
Wagner, Grant M. ;
Reninger, Angela Schuett .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :222-+
[4]  
Goyal V., 2006, P 2006 INT C PRIVACY, P1
[5]   Multiparty Access Control for Online Social Networks: Model and Mechanisms [J].
Hu, Hongxin ;
Ahn, Gail-Joon ;
Jorgensen, Jan .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2013, 25 (07) :1614-1627
[6]   Fine-Grained Access Control for HTML']HTML5-Based Mobile Applications in Android [J].
Jin, Xing ;
Wang, Lusha ;
Luo, Tongbo ;
Du, Wenliang .
INFORMATION SECURITY (ISC 2013), 2015, 7807 :309-318
[7]  
Petracca G, 2017, PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), P379
[8]   Role based access control models [J].
Sandhu, RS ;
Coyne, EJ ;
Feinstein, HL ;
Youman, CE .
COMPUTER, 1996, 29 (02) :38-&
[9]   ACCESS-CONTROL - PRINCIPLES AND PRACTICE [J].
SANDHU, RS ;
SAMARATI, P .
IEEE COMMUNICATIONS MAGAZINE, 1994, 32 (09) :40-48
[10]  
Shen HB, 2006, SEVENTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, P74