Computer Science ›› 2016, Vol. 43 ›› Issue (10): 150-153.doi: 10.11896/j.issn.1002-137X.2016.10.028

Previous Articles     Next Articles

Administrative Model for UCON Based on RBAC

LIU Zhi-feng and MAO Zhu-lin   

  • Online:2018-12-01 Published:2018-12-01

Abstract: UCON is a new generation access control model.It can control usage continually by variable attribute to meet the current demand of open network.But there are still some drawbacks in UCON model,that is to say the authority management,authority delegation and attribute source management can not be achieved.So the role elements are introduced and divided into the provider role and the consumer role based on the UCON model.Then the authority is divided into the direct usage authority and the authority to be authorized,in order to achieve the management of authority and authority delegation in the UCON model.And through the role of the provider,the management of the source of variable attributes can be achieved,making UOCN more flexible in management of authority and the attribute source more reliable,so the application scope of UCON is more extensive.

Key words: UCON,Role,Authority management,Authority delegation,Attribute source management

[1] Park J,Sandhu R.Towards usage control models:beyond traditional access control[C]∥Proceedings of the Seventh ACM Symposium on Access Control models and Technologies.ACM,2002:57-64
[2] Park J,Sandhu R.The UCON ABC usage control model[J].ACM Transactions on Information and System Security (TISSEC),2004,7(1):128-174
[3] Wang Y D,Yang J H,Xu C,et al.Survey on access control technologies for cloud computing[J].Journal of Software,2015,6(5):1129-1150(in Chinese) 王于丁,杨家海,徐聪,等.云计算访问控制技术研究综述[J].软件学报,2015,26(5):1129-1150
[4] Cai Ting,Chen Chang-zhi.Research for Access Control based on UCON in Cloud Computing[J].Computer Science,2014(S1):262-264(in Chinese) 蔡婷,陈昌志.云环境下基于UCON的访问控制模型研究[J].计算机科学,2014(S1):262-264
[5] Zhang Guang-hua.Research on Security Models Based on Trust Management[D].Xi’an:Xidian University,2014(in Chinese) 张光华.基于信任管理的安全模型研究[D].西安:西安电子科技大学,2014
[6] Guo Jing-jing,Ma Jian-feng,Li Qi,et al.Game theory basedtrust management method for mobile ad hoc networks[J].Journal on Communications,2014,35(11):50-58(in Chinese) 郭晶晶,马建峰,李琦,等.基于博弈论的移动自组织网络的信任管理方法[J].通信学报,2014,35(11):50-58
[7] Lv Jing-hua.Research on Techniques of Usage Control in Mobile Digital Publishing Rights Management [D].Beijing:Beijing University of Posts and Telecommunications,2013(in Chinese) 吕井华.移动数字出版版权保护使用控制技术研究[D].北京:北京邮电大学,2013
[8] Zhang Z,Yang L,Pei Q,et al.Research on usage control model with delegation characteristics based on OM-AM methodology[C]∥IFIP International Conference on Network and Parallel Computing Workshops,2007.NPC Workshops.IEEE,2007:238-243
[9] Cai Wei-hong.The Research of Access Control Model Based on EUCON [D].Guangzhou:South China University of Technology,2012(in Chinese) 蔡伟鸿.基于EUCON的访问控制技术研究[D].广州:华南理工大学,2012
[10] Salim F,Reid J,Dawson E.An administrative model forUCONABC [C]∥Proceedings of the Eighth Australasian Conference on Information Security-Volume 105.Australian Computer Society,Inc.,2010:32-38
[11] Lu Ke,Zhou Bao-qun,Wang Hui-fang.Usage Control ModelBased on Timed RBAC and Its Administration [J].Computer Engineering,2008,34(6):170-172(in Chinese) 鲁柯,周保群,王惠芳.基于带时间特性RBAC的使用控制模型及其管理[J].计算机工程,2008,34(6):170-172
[12] Shibli M A,Ali A.Extensible Access Control Framework for Cloud based Applications[EB/OL].http://ais.seecs.nust.edu.pk/project
[13] Jiao D,Lianzhong L,Ting L,et al.Realization of UCON Model Based on extended-XACML[C]∥2011 International Conference on Future Computer Sciences and Application (ICFCSA).IEEE,2011:90-93
[14] Masood R,Shibli M A,Bilal M.Usage control model specification in XACML policy language[M]∥Computer Information Systems and Industrial Management.Springer Berlin Heidelberg,2012:68-79
[15] Colombo M,Lazouski A,Martinelli F,et al.A proposal on enhancing XACML with continuous usage control features[M]∥Grids,P2P and Services Computing.Springer US,2010:133-146

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!