计算机科学 ›› 2016, Vol. 43 ›› Issue (10): 150-153.doi: 10.11896/j.issn.1002-137X.2016.10.028

• 信息安全 • 上一篇    下一篇

一种基于RBAC的UCON管理模型

刘志锋,毛竹林   

  1. 江苏大学计算机科学与通信工程学院 镇江212013,江苏大学计算机科学与通信工程学院 镇江212013
  • 出版日期:2018-12-01 发布日期:2018-12-01

Administrative Model for UCON Based on RBAC

LIU Zhi-feng and MAO Zhu-lin   

  • Online:2018-12-01 Published:2018-12-01

摘要: UCON模型作为新一代的访问控制模型,能够通过可变属性对使用实现连续控制,可满足当前开放的网络环境需求。但UCON模型仍存在一些缺陷:不能实现对权限的管理、对权限的委托和对属性来源的管理。为此,在UCON模型的基础上引入角色元素并把角色分为提供者角色和消费者角色,然后把权限分为直接使用权限和需要授权权限,以实现对UCON模型中权限的管理和权限的委托,并通过提供者角色对可变属性的来源进行管理,使UOCN对权限管理更加灵活,属性来源更加可信,从而使UCON的应用范围更加广泛。

关键词: UCON,角色,权限管理,权限委托,属性来源管理

Abstract: UCON is a new generation access control model.It can control usage continually by variable attribute to meet the current demand of open network.But there are still some drawbacks in UCON model,that is to say the authority management,authority delegation and attribute source management can not be achieved.So the role elements are introduced and divided into the provider role and the consumer role based on the UCON model.Then the authority is divided into the direct usage authority and the authority to be authorized,in order to achieve the management of authority and authority delegation in the UCON model.And through the role of the provider,the management of the source of variable attributes can be achieved,making UOCN more flexible in management of authority and the attribute source more reliable,so the application scope of UCON is more extensive.

Key words: UCON,Role,Authority management,Authority delegation,Attribute source management

[1] Park J,Sandhu R.Towards usage control models:beyond traditional access control[C]∥Proceedings of the Seventh ACM Symposium on Access Control models and Technologies.ACM,2002:57-64
[2] Park J,Sandhu R.The UCON ABC usage control model[J].ACM Transactions on Information and System Security (TISSEC),2004,7(1):128-174
[3] Wang Y D,Yang J H,Xu C,et al.Survey on access control technologies for cloud computing[J].Journal of Software,2015,6(5):1129-1150(in Chinese) 王于丁,杨家海,徐聪,等.云计算访问控制技术研究综述[J].软件学报,2015,26(5):1129-1150
[4] Cai Ting,Chen Chang-zhi.Research for Access Control based on UCON in Cloud Computing[J].Computer Science,2014(S1):262-264(in Chinese) 蔡婷,陈昌志.云环境下基于UCON的访问控制模型研究[J].计算机科学,2014(S1):262-264
[5] Zhang Guang-hua.Research on Security Models Based on Trust Management[D].Xi’an:Xidian University,2014(in Chinese) 张光华.基于信任管理的安全模型研究[D].西安:西安电子科技大学,2014
[6] Guo Jing-jing,Ma Jian-feng,Li Qi,et al.Game theory basedtrust management method for mobile ad hoc networks[J].Journal on Communications,2014,35(11):50-58(in Chinese) 郭晶晶,马建峰,李琦,等.基于博弈论的移动自组织网络的信任管理方法[J].通信学报,2014,35(11):50-58
[7] Lv Jing-hua.Research on Techniques of Usage Control in Mobile Digital Publishing Rights Management [D].Beijing:Beijing University of Posts and Telecommunications,2013(in Chinese) 吕井华.移动数字出版版权保护使用控制技术研究[D].北京:北京邮电大学,2013
[8] Zhang Z,Yang L,Pei Q,et al.Research on usage control model with delegation characteristics based on OM-AM methodology[C]∥IFIP International Conference on Network and Parallel Computing Workshops,2007.NPC Workshops.IEEE,2007:238-243
[9] Cai Wei-hong.The Research of Access Control Model Based on EUCON [D].Guangzhou:South China University of Technology,2012(in Chinese) 蔡伟鸿.基于EUCON的访问控制技术研究[D].广州:华南理工大学,2012
[10] Salim F,Reid J,Dawson E.An administrative model forUCONABC [C]∥Proceedings of the Eighth Australasian Conference on Information Security-Volume 105.Australian Computer Society,Inc.,2010:32-38
[11] Lu Ke,Zhou Bao-qun,Wang Hui-fang.Usage Control ModelBased on Timed RBAC and Its Administration [J].Computer Engineering,2008,34(6):170-172(in Chinese) 鲁柯,周保群,王惠芳.基于带时间特性RBAC的使用控制模型及其管理[J].计算机工程,2008,34(6):170-172
[12] Shibli M A,Ali A.Extensible Access Control Framework for Cloud based Applications[EB/OL].http://ais.seecs.nust.edu.pk/project
[13] Jiao D,Lianzhong L,Ting L,et al.Realization of UCON Model Based on extended-XACML[C]∥2011 International Conference on Future Computer Sciences and Application (ICFCSA).IEEE,2011:90-93
[14] Masood R,Shibli M A,Bilal M.Usage control model specification in XACML policy language[M]∥Computer Information Systems and Industrial Management.Springer Berlin Heidelberg,2012:68-79
[15] Colombo M,Lazouski A,Martinelli F,et al.A proposal on enhancing XACML with continuous usage control features[M]∥Grids,P2P and Services Computing.Springer US,2010:133-146

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!