Chinese Journal of Network and Information Security ›› 2021, Vol. 7 ›› Issue (1): 20-27.doi: 10.11959/j.issn.2096-109x.2021003

• Topic Ⅰ: Security Architecture Applications of Novel Network • Previous Articles     Next Articles

Research on cross-domain access control technology

Tianyi ZHU1,2, Fenghua LI1,2, Lin CHENG3, Yunchuan GUO1,2   

  1. 1 Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100195, China
    2 School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China
    3 China Information Technology Security Evaluation Center, Beijing 100085, China
  • Revised:2020-07-21 Online:2021-02-15 Published:2021-02-01
  • Supported by:
    The National Natural Science Foundation of China(2016QY06X1203);The National Key Research and Development Program of China(U1836203);Shandong Provincial Key Research and Development Program(2019JZZY020127)

Abstract:

Based on the latest research at home and abroad, the access control technology in cross-domain data flow were summarized and prospected.Firstly, combined with access control in complex application environments, the development of access control models and data security modelswere summarized.The advantages and disadvantages of access control policy management were analyzed.Secondly, the research on access control policy management from the aspects of data marking, policy matching and policy conflict detection were discussed respectively.Finally, the research status of data marking technology and authorization and extension control technology in unified authorization management were summarized.

Key words: cross-domain data flow, access control model, policy authorization management

CLC Number: 

No Suggested Reading articles found!