A Lightweight Graph-Based Model for Inter-networking Access Control

被引:0
|
作者
Kang, Zhongmiao [1 ]
Jiang, Wenting [1 ]
Chen, Yan [1 ]
机构
[1] Guangdong Power Grid Corp, Guangzhou 510000, Guangdong, Peoples R China
来源
CLOUD COMPUTING AND SECURITY, PT IV | 2018年 / 11066卷
关键词
Access control; Privilege management; Graph theory; Networking;
D O I
10.1007/978-3-030-00015-8_51
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In classic operation systems, processes are assigned different privileges according to the resources. The enforcement of privilege differentiation on diverse processes indicates that strict security management on the individual process, whose emphasis on the restriction on respective process, however, may also overlook the security risk among the processes. Specifically, one process can invoke another one and establish a session, during which the privileges of invoked process may be passed to the invoking process (e. g., by the inter-processes requests). Thus, it may result in the abuse of privilege and resource leakage. Moreover, the internetworking of the processes and their relations also complicate the tasks for the regulation on authorized privileges, and those can be obtained by inheritance. The management on the latter case (i. e., the inherited privileges) has not been well considered in the existing access control models, whose implementation also incur large overhead. In this paper, we propose a lightweight graph-based access control model to manage the privileges between the networked processes, which provides a general solution for the pervasive applicabilities such as process inter-invoking and network-based access control.
引用
收藏
页码:589 / 597
页数:9
相关论文
共 50 条
  • [41] A Generic Access Control Model based on Ontology
    Wang Zhen-wu
    2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 335 - 339
  • [42] An Access Control Model for Multi-level Security in Multi-domain Networking Environments
    Zhang, Hongbin
    Wang, Junshe
    Chang, Jiang
    2017 9TH INTERNATIONAL CONFERENCE ON MODELLING, IDENTIFICATION AND CONTROL (ICMIC 2017), 2017, : 809 - 814
  • [43] AC-PROT: An Access Control Model to Improve Software-Defined Networking Security
    Wu, Wei
    Liu, Renping
    Ni, Wei
    Kaafar, Dali
    Huang, Xiaojing
    2017 IEEE 85TH VEHICULAR TECHNOLOGY CONFERENCE (VTC SPRING), 2017,
  • [44] An Approach to Robust Urban Transport Management. Mixed Graph-Based Model for Decision Support
    Wisniewski, Piotr
    Ligeza, Antoni
    ARTIFICIAL INTELLIGENCE AND SOFT COMPUTING, ICAISC 2017, PT II, 2017, 10246 : 347 - 356
  • [45] A Graph-Based Mathematical Model for More Efficient Dimensionality Reduction of Landmark Data in Geometric Morphometrics
    Courtenay, Lloyd A.
    Aramendi, Julia
    Gonzalez-Aguilera, Diego
    EVOLUTIONARY BIOLOGY, 2024, 51 (3-4) : 310 - 329
  • [46] A Quantity Based Aggregation Control Model for Graph Databases
    Gabillon, Alban
    Capolsini, Patrick
    Al Khalil, Firas
    2016 INT IEEE CONFERENCES ON UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING AND COMMUNICATIONS, CLOUD AND BIG DATA COMPUTING, INTERNET OF PEOPLE, AND SMART WORLD CONGRESS (UIC/ATC/SCALCOM/CBDCOM/IOP/SMARTWORLD), 2016, : 921 - 929
  • [47] An access control model considering with transitions of access rights based on the blockchain
    Kinoshita, Hirotsugu
    Morizumi, Tetsuya
    2022 IEEE 46TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2022), 2022, : 1792 - 1797
  • [48] Practical Hybrid Graph-Based Formation Control Architecture for Leader-Follower Trajectory Tracking Problem
    Elias, Catherine M.
    El Baklish, Shaimaa K.
    El-Ghandoor, Nada N.
    Shehata, Omar M.
    Morgan, Elsayed, I
    2018 IEEE INTERNATIONAL CONFERENCE ON VEHICULAR ELECTRONICS AND SAFETY (ICVES 2018), 2018,
  • [49] An interest-based access control scheme via edge verification in Named Data Networking
    Tao, Yu
    Zhu, Yi
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2022, 35 (10)
  • [50] Identity-based Secret Sharing Access Control Framework for Information-Centric Networking
    Deng, Lianglang
    Luo, Jiangtao
    Zhou, Jie
    Wang, Junxia
    2020 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC), 2020, : 507 - 511