An Action Based Access Control Model for Multi-level Security

被引:0
作者
Su, Mang [1 ]
Li, Fenghua [2 ]
Shi, Guozhen [3 ]
Li, Li [3 ]
机构
[1] Xidian Univ, Natl Key Lab Integrated Serv Network, Xian 710071, Shaanxi, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, Beijing 100195, Peoples R China
[3] Beijing Elect Sci & Technol Inst, Dept Elect Engn, Beijing 100070, Peoples R China
来源
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS | 2012年 / 6卷 / 02期
基金
北京市自然科学基金; 中国国家自然科学基金;
关键词
multi-level security; access control; action; security level; structured document;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The new computing modes, such as mobile computing, distributed computing, cloud computing and ubiquitous computing, etc., have brought about diversification and open features to the expression, exchange and access of computer network information. The multilevel security management is widely used in operation systems and information management systems. Focus on the multi-level security problem in various network environments, this paper defines the security identity, environment and temporal state of object, based on the ABAC (Action Based Access Control), and shows the security level, access scope and the demand of environment and temporal state of accessing subject, then proposes a multi-level security access control mechanism. Finally, an application example is given.
引用
收藏
页码:359 / 366
页数:8
相关论文
共 8 条
  • [1] Bell D. E., 2005, P 21 C ANN COMP SEC
  • [2] BIBA K. J., 1977, MTR3153
  • [3] Campbell J., 1998, FUTURE MULTILEVEL SE
  • [4] Department of Defense, 1985, 520028 DOD DEP
  • [5] Jajodia S., 1995, MULTILEVEL SECURE RE
  • [6] Li F. H., 2008, ACTION BASED ACCESS, V17
  • [7] Sandhu R., 1996, ROLE BASED ACCESS CO, V2, P29
  • [8] Yan Z., 2006, VIEW BASED MULTILEVE, V43