An authorisation certificate-based access control model

被引:1
|
作者
Li W. [1 ]
He J. [1 ]
Zhu N. [1 ]
Jin S. [1 ]
Teng D. [1 ]
机构
[1] Faculty of Information Technology, Beijing University of Technology, Beijing
关键词
Access control; Access control model; Authorisation certificate; Distributed control; Formalisation;
D O I
10.1504/IJSN.2021.119393
中图分类号
学科分类号
摘要
There are currently many types of access control models and schemes that have been proposed to protect valuable resources in a distributed environment. Many such models have failed to take into consideration efficiency, security, practical implementation and management at the same time. Based on the analysis of conventional certificate-based access control characteristics, this paper proposes an authorisation certificate-based access control (ACBAC) model to realise access control in a distributed environment. Employing certificates in access control can help meet the various requirements in distributed networks or systems while ensuring security to a great extent. Efficiency and security can thus be improved by delegating the functions of making access authorisation decisions to the certificate issuer (CI). We will formally describe the model, introduce the application scenarios and the processes of the model, and provide the details of implementation. Finally, the effectiveness and superiority of the model is verified through experiment and analysis. Copyright © 2021 Inderscience Enterprises Ltd.
引用
收藏
页码:258 / 266
页数:8
相关论文
共 50 条
  • [31] Towards Certificate-Based Group Encryption
    Ren, Yili
    Luo, Xiling
    Wu, Qianhong
    Liu, Joseph K.
    Zhang, Peng
    PROVABLE SECURITY, (PROVSEC 2016), 2016, 10005 : 296 - 305
  • [32] Improved for certificate-based signature scheme
    Department of Computer Science, Minnan Normal University, Zhangzhou
    Fujian
    363000, China
    Beijing Youdian Daxue Xuebao, 3 (48-52):
  • [33] Cryptanalysis of a Certificate-Based on Signature Scheme
    Cheng, Lin
    Xiao, Ying
    Wang, Gang
    2012 INTERNATIONAL WORKSHOP ON INFORMATION AND ELECTRONICS ENGINEERING, 2012, 29 : 2821 - 2825
  • [34] Forward-Secure Certificate-Based Encryption
    Lu, Yang
    Li, Jiguo
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 57 - 60
  • [35] Certificate-based authorization policy in a pki environment
    Thompson, Mary R.
    Essiari, Abdelilah
    Mudumbai, Srilekha
    2003, Association for Computing Machinery (06)
  • [36] A certificate-based watermarking scheme for coloured images
    Wu, N. -I.
    Wang, C. -M.
    Tsai, C. -S.
    Hwang, M. -S.
    IMAGING SCIENCE JOURNAL, 2008, 56 (06): : 326 - 332
  • [37] Enhanced Certificate-Based Authentication for Distributed Environment
    Jesudoss, A.
    Subramaniam, N. P.
    ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY ALGORITHMS IN ENGINEERING SYSTEMS, VOL 2, 2015, 325 : 675 - 685
  • [38] Gene-Certificate Based Model for User Authentication and Access Control
    Sun, Feixian
    WEB INFORMATION SYSTEMS AND MINING, 2010, 6318 : 228 - 235
  • [39] Certificateless and certificate-based signatures from lattices
    Tian, Miaomiao
    Huang, Liusheng
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (08) : 1575 - 1586
  • [40] A New Efficient Certificate-Based Signature Scheme
    Zhang Yichen
    Li Jiguo
    Wang Zhiwei
    Yao Wei
    CHINESE JOURNAL OF ELECTRONICS, 2015, 24 (04) : 776 - 782