Computer Science ›› 2015, Vol. 42 ›› Issue (3): 96-101.doi: 10.11896/j.issn.1002-137X.2015.03.020

Previous Articles     Next Articles

Attribute-based Access Control Method Supporting Policies Ontology Reasoning

NI Chuan, HUANG Zhi-qiu, WANG Shan-shan and HUANG Chuan-lin   

  • Online:2018-11-14 Published:2018-11-14

Abstract: In large-scale and distributed systems,attribute-based access control(ABAC) proves its appropriateness out of the ordinary.However,the management of policies turns out to be complex and error-prone for the heterogeneity of network environment,the complexity of policy control and policy sets of large-scale and lack-of-semantic.In order to solve the problem,this paper presented an approach based on the established XACML standard to extend current ABAC authorization architecture with ontology consistency reasoning.First,it carries out a quantitative analysis on several important access control models under distributed environment.Second,it determines the consistency of policies in accor-dance with the result of the consistency checking on the ontology knowledge base.Third,it designs an experimental scheme in order to verify the validity and correctness of our method.

Key words: ABAC,Semantic Web,Ontology,XACML

[1] Oh S,Sandhu R.A Model for Role Administration Using Organ-ization Structure[C]∥SACMAT’02.Monterey,California,USA,June 3-4,2002
[2] Ferraiolo D F,Sandhu R,Gavrila S,et al.Proposed NIST Stan-dard for Role-based Access Control[J].ACM Transactions on Information and SystemsSecurity,2001,4(3)
[3] Priebe T,Dobmeier W,Muschall B,et al.ABAC-Ein Referenz model für attribute basierte Zugriffs kontrolle[C]∥Proc.2.Jahrestagung Fachbereich Sicherheit der Gesell schaft für Informatik (Sicherheit 2005).Regensburg,Germany,April 2005
[4] Berners-Lee T.A Roadmap to the Semantic Web.WorldWide Web Consortium,September 1998.http://www.w3.org/DesignIssues/Semantic.html
[5] Resource Description Framework (RDF):Concepts and Syntax.World Wide Web Consortium,February 2004.http://www.w3.org/TR/2004/REC-rdf-concepts-2004021
[6] OWL Web Ontology Language Overview.World WideWeb Consortium,February 2004.http://www.w3.org/TR/2004/REC-owl-features-20040210
[7] SWRL:A Semantic Web Rule Language Combining OWL and RuleML.November 2003.http://www.daml.org/2003/11/swrl
[8] OASIS eXtensible Access Control Markup Language Technical Committee:eXtensible Access Control Markup Language(XACML).http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=xacml
[9] Sandhu R S.Access Control:The Neglected Frontier [C]∥Pieprzyk J P,Seberry J,eds.ACISP 1996.LNCS 1172,Springer:Heidelberg,1996:219-227
[10] Bell D E,LaPadula L J.Secure Computer Systems:Mathematical Foundations and Model[M].Mitre Corp.,Bedford,MA,1975
[11] Huang Jing-wei,Nicol D M,Bobba R,et al.A Framework Integrating Attribute-based Policies into Role-Based Access Control[C]∥SACMAT’12.Newark,New Jersey,USA,June 2012:20-22
[12] RDF Vocabulary Description Language 1.0:RDF SchemaWorld Wide Web Consortium,February 2004.http://www.w3.org/TR/2004/REC-rdf-schema-20040210
[13] Jin X,Krishnan R,Sandhu R.A Unified Attribute-Based Access Control Model Covering DAC,MAC and RBAC[C]∥Cuppens-Boulahia N,Cuppens F,Garcia-Alfaro J,eds.DBSec 2012.LNCS 7371,2012:41-55
[14] Priebe T.Supporting Attribute-based Access Control with On-tologies[C]∥ARES’06.IEEE,2006
[15] Kolter J,Schillinger R,Pernul G.A Privacy-Enhanced Attribu-te-Based Access Control System[C]∥Data and Applications Security 2007.LNCS 4602,2007:129-143
[16] 葛强,沈国华,黄志球,等.Web服务中支持本体推理的隐私保护研究[J].计算机科学与探讨,2013(6):536-544
[17] 黄凤.基于描述逻辑的访问控制策略冲突检测方法研究[D].南京:南京航空航天大学,2010
[18] Yagüe M,Mana A,Lopez L,et al.Applying the Semantic Web Layers to Access Control[C]∥Proc.of the DEXA2003 Workshop on Web Semantics (Webs 2003).Prague,Czech Republic,September 2003
[19] Shen Hai-bo.A Semantic-Aware Attribute-Based Access Con-trol Model for Web Services[C]∥ICA3PP 2009.LNCS 5574,2009:693-703
[20] Cirio L,Cruz I F,Tamassia R.A Role and Attribute Based Access Control System Using Semantic Web Technologies[C]∥OTM 2007 Ws.Part II,LNCS 4806,2007:1256-1266
[21] Zha D,Jing Ji-wu,Liu Peng,et al.Proactive Identification andPrevention of Unexpected Future Rule Conflicts in Attribute Based Access Control[C]∥ICCSA 2010.Part IV,LNCS 6019,2010:468-481
[22] Berners-Lee T,Hall W,James A.et al.Weitzner:A framework for Web science[J].Foundations and Trends in Web Science,2006,1(1):1-130

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!