An authorisation certificate-based access control model

被引:1
|
作者
Li W. [1 ]
He J. [1 ]
Zhu N. [1 ]
Jin S. [1 ]
Teng D. [1 ]
机构
[1] Faculty of Information Technology, Beijing University of Technology, Beijing
关键词
Access control; Access control model; Authorisation certificate; Distributed control; Formalisation;
D O I
10.1504/IJSN.2021.119393
中图分类号
学科分类号
摘要
There are currently many types of access control models and schemes that have been proposed to protect valuable resources in a distributed environment. Many such models have failed to take into consideration efficiency, security, practical implementation and management at the same time. Based on the analysis of conventional certificate-based access control characteristics, this paper proposes an authorisation certificate-based access control (ACBAC) model to realise access control in a distributed environment. Employing certificates in access control can help meet the various requirements in distributed networks or systems while ensuring security to a great extent. Efficiency and security can thus be improved by delegating the functions of making access authorisation decisions to the certificate issuer (CI). We will formally describe the model, introduce the application scenarios and the processes of the model, and provide the details of implementation. Finally, the effectiveness and superiority of the model is verified through experiment and analysis. Copyright © 2021 Inderscience Enterprises Ltd.
引用
收藏
页码:258 / 266
页数:8
相关论文
共 50 条
  • [21] Certificate-Based Key-Insulated Signature in the Standard Model
    Li, Jiguo
    Du, Haiting
    Zhang, Yichen
    COMPUTER JOURNAL, 2016, 59 (07): : 1028 - 1039
  • [22] Certificate-based proxy decryption systems with revocability in the standard model
    Wang, Lihua
    Shao, Jun
    Cao, Zhenfu
    Mambo, Masahiro
    Yamamura, Akihiro
    Wang, Licheng
    INFORMATION SCIENCES, 2013, 247 : 188 - 201
  • [23] A Study on Certificate-Based Trust in MANETs
    Narayan, K. Gowri Raghavendra
    Rao, T. Srinivasa
    Raju, P. Pothu
    Sudhakar, P.
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND DATA ENGINEERING, 2018, 9 : 41 - 54
  • [24] A Certificate-Based Provable Data Possession Scheme in the Standard Model
    Zhou, Caixue
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [25] An Efficient and Secure Certificate-Based Access Control and Key Agreement Scheme for Flying Ad-Hoc Networks
    Khan, Muhammad Asghar
    Ullah, Insaf
    Kumar, Neeraj
    Oubbati, Omar Sami
    Qureshi, Ijaz Mansoor
    Noor, Fazal
    Khanzada, Fahim Ullah
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2021, 70 (05) : 4839 - 4851
  • [26] Access control model for web services based on attribute certificate
    Jin, Li'na
    Jiang, Xinghao
    Li, Jianhua
    Jisuanji Gongcheng/Computer Engineering, 2006, 32 (16): : 136 - 138
  • [27] Short and Efficient Certificate-Based Signature
    Liu, Joseph K.
    Bao, Feng
    Zhou, Jianying
    NETWORKING 2011 WORKSHOPS, 2011, 6827 : 167 - 178
  • [28] On the security of a certificate-based signcryption scheme
    Yuan, Y. (ymyuan@xmu.edu.cn), 1600, CESER Publications, Post Box No. 113, Roorkee, 247667, India (49):
  • [29] Generic Construction of Certificate-based Encryption
    Lu, Yang
    Li, Jiguo
    Xia, Junmo
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 1589 - +
  • [30] Efficient Certificate-Based Signature Scheme
    Ming, Yang
    Wang, Yumin
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 87 - +