A Novel Cyberspace-Oriented Access Control Model

نویسندگان

  • Fenghua Li
  • Yanchao Wang
  • Rongna Xie
  • Jinbo Xiong
  • Fangfang Shan
چکیده

With the developments of mobile communication, networks and information technology, many new information service patterns and dissemination modes emerge with some security and privacy threats in access control, i.e., the ownership of data is separated from the administration of them, secondary/mutiple information distribution etc. Existing access control models, which are always proposed for some specific scenarios, are hardly to achieve finegrained and adaptive access control. In this paper, we propose a novel Cyberspace-oriented Access Control model, termed as CoAC, which avoids the aforementioned threats by comprehensively considering some vital factors, such as the access requesting entity, general tense, access point, resource, device, networks, internet-based interactive graph and chain of resource transmission. By appropriately adjusting these factors, CoAC covers most of typical access control models and fulfills the requirements of new information service patterns and dissemination modes. We also present the administrative model of our proposed CoAC model and formally describe the administrative functions and methods used in the administrative model by utilizing Z-notation. Our CoAC is flexible and scalable, it can be further refined and expanded to figure out new opportunities and challenges in the upcoming access control techniques.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Enabling User-Oriented Data Access in a Satellite Data Portal*

This paper presents the design and implementation of a webenabled platform for enhancing user data access experience in a satellite data portal. The platform integrates a number of useroriented capabilities including the subscription, production, dissemination, and visualization of custom satellite remote sensing data hosted at the Purdue Terrestrial Observatory (PTO). Different from a traditio...

متن کامل

Sensorless Indirect Field Oriented Control of Single-sided Linear Induction Motor With a Novel Sliding Mode MRAS Speed Estimator

This paper proposes a new sliding mode control (SMC)  based model reference adaptive system (MRAS) for sensorless indirect field oriented control (IFOC) of a single-sided linear induction motor (SLIM). The operation of MRAS speed estimators dramatically depends on adaptation mechanism. Fixed-gain PI controller is conventionally used for this purpose which may fail to estimate the speed correctl...

متن کامل

A Psychoanalytic Reading of Cyberspace: Problematizing the Digitalization of Oedipus Complex and the Dialectic of Subjectivity and Castration in the Cyberspace

In the present paper, a translational model to psychoanalyze the cyberspace is presented with the argument that cyberspace is a translated version of human unconscious that projects both our unfulfilled desires and suppressed anxieties. This Freudian-based line of argument is followed by Lacanian (1950s)and Zizekian (2004) psychoanalysis to problematize the digitalization of Oedipus complex and...

متن کامل

A Comparative Study of Regulating the Filtering of Cyberspace in the US, the EU and China; Proposals for Policymaking in Iran

The crucial role of cyberspace attracted the special attention of the governments in different countries, which consider it both as a challenge and an opportunity. One of the key policies and preventive measures adopted concerning the challenges posed by the cyberspace is it regulation. In fact, there are only a few states have not taken any steps in regulating their cyberspace. This paper seek...

متن کامل

ROAC: A Role-Oriented Access Control Model

Role-Based Access Control (RBAC) has become the de facto standard for realizing authorization requirements in a wide range of organizations. Existing RBAC models suffer from two main shortcomings; lack of expressiveness of roles/permissions and ambiguities of their hierarchies. Roles/permissions expressiveness is limited since roles do not have the ability to express behaviour and state, while ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2015  شماره 

صفحات  -

تاریخ انتشار 2015