通信学报 ›› 2016, Vol. 37 ›› Issue (5): 9-20.doi: 10.11959/j.issn.1000-436x.2016109

• 学术论文 • 上一篇    下一篇

面向网络空间的访问控制模型

李凤华1,王彦超1,殷丽华1,谢绒娜2,熊金波1   

  1. 1 中国科学院信息工程研究所信息安全国家重点实验室,北京 100093
    2 北京电子科技学院信息安全系,北京 100070
  • 出版日期:2016-05-25 发布日期:2016-06-01
  • 基金资助:
    国家自然科学基金面上基金资助项目;国家高技术研究发展计划(“863”计划)基金资助项目;国家自然科学基金-广东联合基金资助项目;国家自然科学基金青年基金资助项目

Novel cyberspace-oriented access control model

Feng-hua LI1,Yan-chao WANG1,Li-hua YIN1,Rong-na XIE2,Jin-bo XIONG1   

  1. 1 The State Key Laboratory of Information Security,Institute of Information Engineering,Chinese Academy of Sciences,Beijing 100093,China
    2 Department of Information Security,Beijing Electronic Science and Technology Institute,Beijing 100070,China
  • Online:2016-05-25 Published:2016-06-01
  • Supported by:
    The National Natural Science Foundation of China Gener l Project;The National High Technology Research and Development Program of China (863 Program);The National Natural Science Foundation of China-Guangdong Joint Program;The National Natural Science Youth Science Foundation of China

摘要:

提出一种面向网络空间的访问控制模型,记为 CoAC。该模型涵盖了访问请求实体、广义时态、接入点、访问设备、网络、资源、网络交互图和资源传播链等要素,可有效防止由于数据所有权与管理权分离、信息二次/多次转发等带来的安全问题。通过对上述要素的适当调整可描述现有的经典访问控制模型,满足新的信息服务和传播模式的需求。给出了CoAC管理模型,使用Z-符号形式化地描述了管理模型中使用的管理函数和管理方法。该模型具有极大的弹性、灵活性和可扩展性,并可进一步扩充完善,以适应未来信息传播模式的新发展。

关键词: 网络空间安全, 访问控制, 管理场景, 信息服务模式, 信息传播模式

Abstract:

A novel cyberspace-oriented access control model was proposed,termed as CoAC,which avoided the threats by comprehensively considering vital factors,such as access requesting entity,general tense,access point,device,networks,resource,internet-based interactive graph and chain of resource transmission.By appropriately adjusting these factors,CoAC emulated most of typical access control models and fulfilled the requirements of new information service patterns and dissemination modes.The administrative model of CoAC was also presented and the functions and methods for administrating CoAC were described by utilizing Z-notation.CoAC is flexible and scalable,it can be further refined and expanded to figure out new opportunities and challenges in the upcoming access control techniques.

Key words: cyberspace security, access control, administrative scene, information service pattern, information dissemi-nation mode

No Suggested Reading articles found!