Action-based multi-level access control model

被引:0
|
作者
Su, Mang [1 ]
Li, Fenghua [2 ]
Shi, Guozhen [3 ]
机构
[1] State Key Laboratory of Integrated Services Network, Xidian University, Xi'an,710071, China
[2] State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing,100093, China
[3] Department of Information Security, Beijing Electronic Science and Technology Institute, Beijing,100070, China
关键词
Multimedia systems - Problem solving - Environmental management - Specifications;
D O I
10.7544/issn1000-1239.2014.20131717
中图分类号
学科分类号
摘要
The developments of communication, computer, and multimedia technologies have speeded up information transmission. The information has been becoming multi-dimensional. The multi-level security could not only ensure the correctness of information transmission, but also keep the integrality and confidentiality of the data. The traditional multi-level security models have been implemented with the classic access control models, such as RBAC (role-based access control), which solve the problems of multi-level access control to some extent. But they could not accommodate the users' requirements of multi-level permission management at anytime and anywhere with the consideration of the temporal and environmental factors in the existing multi-level security access control mechanisms. How to implement the multi-level access control with the consideration of time and environment has become a problem to be solved. Firstly, we present an action-based multi-level access control model, which integrates the BLP and ABAC (action-based access control) together by extending the security level to action. Secondly, in order to solve the problem of permission specification with time and environment, we make the description of security level more detailed by defining the reading level (lr) and writing level (lw). The corresponding security rules and proof have been given. Finally, we give the implementing scheme of our model. By integrating the temporal state and environmental state together for the current complicated network, our scheme could solve the problems of the multi-level management and access control.
引用
收藏
页码:1604 / 1613
相关论文
共 50 条
  • [21] MODEL CHECKING FOR ACTION-BASED LOGICS
    FANTECHI, A
    GNESI, S
    RISTORI, G
    FORMAL METHODS IN SYSTEM DESIGN, 1994, 4 (02) : 187 - 203
  • [22] Action-Based Multi-Camera Synchronization
    Zini, Luca
    Cavallaro, Andrea
    Odone, Francesca
    IEEE JOURNAL ON EMERGING AND SELECTED TOPICS IN CIRCUITS AND SYSTEMS, 2013, 3 (02) : 165 - 174
  • [23] Model-based Diagnosis and Fault Tolerant Control for Multi-Level Inverters
    Alavi, Marjan
    Wang, Danwei
    Luo, Ming
    IECON 2015 - 41ST ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY, 2015, : 1548 - 1553
  • [24] Multi-Level modeling and access control for data sharing in collaborative design
    Kim, T
    Cera, CD
    Regli, WC
    Choo, H
    Han, J
    ADVANCED ENGINEERING INFORMATICS, 2006, 20 (01) : 47 - 57
  • [25] Efficient Multi-Level Access Control for Geo-Contents Maintenance
    Park, Sun-Rae
    Lee, Jong Suk Ruth
    Cho, Kum Won
    Lee, Kyu-Chul
    STUDIES IN INFORMATICS AND CONTROL, 2013, 22 (01): : 91 - 96
  • [26] An Internet of Things Based Multi-Level Privacy-Preserving Access Control for Smart Living
    Salama, Usama
    Yao, Lina
    Paik, Hye-young
    INFORMATICS-BASEL, 2018, 5 (02):
  • [27] Web-based Multi-level Smart Card Access Control System on University Campus
    Du, Zhao
    Tang, Yeming
    2014 5TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS), 2014, : 1015 - 1018
  • [28] MultiLevel-OrBAC : Multi-Level Integrity management in organization based access control framework
    Baina, Amine
    Laarouchi, Youssef
    2012 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS), 2012, : 933 - 938
  • [29] Multi-Layer Encryption for multi-level access control in Wireless Sensor Networks
    Teng, Po-Yuan
    Huang, Shih-I
    Perrig, Adrian
    PROCEEDINGS OF THE IFIP TC 11/ 23RD INTERNATIONAL INFORMATION SECURITY CONFERENCE, 2008, : 705 - 709
  • [30] Human Action Recognition Based On Multi-level Feature Fusion
    Xu, Y. Y.
    Xiao, G. Q.
    Tang, X. Q.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL APPLICATIONS (CISIA 2015), 2015, 18 : 353 - 355