An Action Based Access Control Model for Multi-level Security

被引:0
|
作者
Su, Mang [1 ]
Li, Fenghua [2 ]
Shi, Guozhen [3 ]
Li, Li [3 ]
机构
[1] Xidian Univ, Natl Key Lab Integrated Serv Network, Xian 710071, Shaanxi, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, Beijing 100195, Peoples R China
[3] Beijing Elect Sci & Technol Inst, Dept Elect Engn, Beijing 100070, Peoples R China
基金
北京市自然科学基金; 中国国家自然科学基金;
关键词
multi-level security; access control; action; security level; structured document;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The new computing modes, such as mobile computing, distributed computing, cloud computing and ubiquitous computing, etc., have brought about diversification and open features to the expression, exchange and access of computer network information. The multilevel security management is widely used in operation systems and information management systems. Focus on the multi-level security problem in various network environments, this paper defines the security identity, environment and temporal state of object, based on the ABAC (Action Based Access Control), and shows the security level, access scope and the demand of environment and temporal state of accessing subject, then proposes a multi-level security access control mechanism. Finally, an application example is given.
引用
收藏
页码:359 / 366
页数:8
相关论文
共 50 条
  • [1] Action-based multi-level access control model
    Su, Mang
    Li, Fenghua
    Shi, Guozhen
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2014, 51 (07): : 1604 - 1613
  • [2] An Access Control Model for Multi-level Security in Multi-domain Networking Environments
    Zhang, Hongbin
    Wang, Junshe
    Chang, Jiang
    2017 9TH INTERNATIONAL CONFERENCE ON MODELLING, IDENTIFICATION AND CONTROL (ICMIC 2017), 2017, : 809 - 814
  • [3] BC-BLPM: A Multi-Level Security Access Control Model Based on Blockchain Technology
    Xiang Yu
    Zhangxiang Shu
    Qiang Li
    Jun Huang
    中国通信, 2021, 18 (02) : 110 - 135
  • [4] BC-BLPM: A Multi-Level Security Access Control Model Based on Blockchain Technology
    Yu, Xiang
    Shu, Zhangxiang
    Li, Qiang
    Huang, Jun
    CHINA COMMUNICATIONS, 2021, 18 (02) : 110 - 135
  • [5] A multi-level security model based on trusted computing
    Jia, Zhao
    Liu Ji-qiang
    Jing, Chen
    PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 448 - +
  • [6] Multi-level Security System Verification Based on the Model
    Stasiak, Andrzej
    Zielinski, Zbigniew
    ENGINEERING SOFTWARE SYSTEMS: RESEARCH AND PRAXIS, 2019, 830 : 69 - 85
  • [7] a Multi-Level Dynamic Access Control Model and Its Formalization
    Zhou, Yanjie
    Ma, Li
    Wen, Min
    2015 2ND INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CONTROL ENGINEERING ICISCE 2015, 2015, : 23 - 27
  • [8] A Multi-level Security Access Control Framework for Cross-Domain Networks
    Zhang, Hongbin
    Chang, Jiang
    Wang, Junshe
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 2, 2017, : 316 - 319
  • [9] A Multi-Level Cross-Domain Access Control Model Based On Role Mapping
    Lv, Bin
    Zhang, Di
    Mao, Rui
    Yang, Haitian
    PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON MECHANICAL MATERIALS AND MANUFACTURING ENGINEERING (MMME 2016), 2016, 79 : 230 - 235
  • [10] MLS-ABAC: Efficient Multi-Level Security Attribute-Based Access Control scheme
    Aghili, Seyed Farhad
    Sedaghat, Mahdi
    Singelee, Dave
    Gupta, Maanak
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2022, 131 : 75 - 90