A Lightweight Graph-Based Model for Inter-networking Access Control

被引:0
|
作者
Kang, Zhongmiao [1 ]
Jiang, Wenting [1 ]
Chen, Yan [1 ]
机构
[1] Guangdong Power Grid Corp, Guangzhou 510000, Guangdong, Peoples R China
来源
CLOUD COMPUTING AND SECURITY, PT IV | 2018年 / 11066卷
关键词
Access control; Privilege management; Graph theory; Networking;
D O I
10.1007/978-3-030-00015-8_51
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In classic operation systems, processes are assigned different privileges according to the resources. The enforcement of privilege differentiation on diverse processes indicates that strict security management on the individual process, whose emphasis on the restriction on respective process, however, may also overlook the security risk among the processes. Specifically, one process can invoke another one and establish a session, during which the privileges of invoked process may be passed to the invoking process (e. g., by the inter-processes requests). Thus, it may result in the abuse of privilege and resource leakage. Moreover, the internetworking of the processes and their relations also complicate the tasks for the regulation on authorized privileges, and those can be obtained by inheritance. The management on the latter case (i. e., the inherited privileges) has not been well considered in the existing access control models, whose implementation also incur large overhead. In this paper, we propose a lightweight graph-based access control model to manage the privileges between the networked processes, which provides a general solution for the pervasive applicabilities such as process inter-invoking and network-based access control.
引用
收藏
页码:589 / 597
页数:9
相关论文
共 50 条
  • [1] Lico: A Lightweight Access Control Model for Inter-Networking Linkages
    Li, Simin
    Ren, Wei
    Zhu, Tianqing
    Choo, Kim-Kwang Raymond
    IEEE ACCESS, 2018, 6 : 51748 - 51755
  • [2] Graph-based specification of access control policies
    Koch, M
    Mancini, LV
    Parisi-Presicce, F
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2005, 71 (01) : 1 - 33
  • [3] Research of Graph-based Workflow Access Control
    Wei, Yonghe
    Shi, Chunjing
    ISCSCT 2008: INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY, VOL 2, PROCEEDINGS, 2008, : 58 - 62
  • [4] A graph-based framework for the analysis of access control policies
    Alves, Sandra
    Fernandez, Maribel
    THEORETICAL COMPUTER SCIENCE, 2017, 685 : 3 - 22
  • [5] A Privacy-aware Graph-based Access Control System for the Healthcare Domain
    Tian, Yuan
    Song, Biao
    Hassan, M. Mehedi
    Huh, Eui-Nam
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2012, 6 (10): : 2708 - 2730
  • [6] Robust hierarchical model predictive control of graph-based power flow systems
    Koeln, Justin P.
    Alleyne, Andrew G.
    AUTOMATICA, 2018, 96 : 127 - 133
  • [7] Traceable Lightweight and Fine-grained Access Control in Named Data Networking
    Luo Jiangtao
    He Chen
    Wang Junxia
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2019, 41 (10) : 2428 - 2434
  • [8] LIVE: Lightweight Integrity Verification and Content Access Control for Named Data Networking
    Li, Qi
    Zhang, Xinwen
    Zheng, Qingji
    Sandhu, Ravi
    Fu, Xiaoming
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (02) : 308 - 320
  • [9] A heterogeneous graph-based semi-supervised learning framework for access control decision-making
    Yin, Jiao
    Chen, Guihong
    Hong, Wei
    Cao, Jinli
    Wang, Hua
    Miao, Yuan
    WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2024, 27 (04):
  • [10] Graph-Based Distributed Control in Vehicular Communications Networks
    Zhao, Jikui
    Dong, Yudi
    Wang, Huaxia
    2023 IEEE 97TH VEHICULAR TECHNOLOGY CONFERENCE, VTC2023-SPRING, 2023,