Journal on Communications ›› 2016, Vol. 37 ›› Issue (5): 9-20.doi: 10.11959/j.issn.1000-436x.2016109

• Papers • Previous Articles     Next Articles

Novel cyberspace-oriented access control model

Feng-hua LI1,Yan-chao WANG1,Li-hua YIN1,Rong-na XIE2,Jin-bo XIONG1   

  1. 1 The State Key Laboratory of Information Security,Institute of Information Engineering,Chinese Academy of Sciences,Beijing 100093,China
    2 Department of Information Security,Beijing Electronic Science and Technology Institute,Beijing 100070,China
  • Online:2016-05-25 Published:2016-06-01
  • Supported by:
    The National Natural Science Foundation of China Gener l Project;The National High Technology Research and Development Program of China (863 Program);The National Natural Science Foundation of China-Guangdong Joint Program;The National Natural Science Youth Science Foundation of China

Abstract:

A novel cyberspace-oriented access control model was proposed,termed as CoAC,which avoided the threats by comprehensively considering vital factors,such as access requesting entity,general tense,access point,device,networks,resource,internet-based interactive graph and chain of resource transmission.By appropriately adjusting these factors,CoAC emulated most of typical access control models and fulfilled the requirements of new information service patterns and dissemination modes.The administrative model of CoAC was also presented and the functions and methods for administrating CoAC were described by utilizing Z-notation.CoAC is flexible and scalable,it can be further refined and expanded to figure out new opportunities and challenges in the upcoming access control techniques.

Key words: cyberspace security, access control, administrative scene, information service pattern, information dissemi-nation mode

No Suggested Reading articles found!