• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Xiong Jinbo, Yao Zhiqiang, Ma Jianfeng, Li Fenghua, Li Qi. Action-Based Multilevel Access Control for Structured Document[J]. Journal of Computer Research and Development, 2013, 50(7): 1399-1408.
Citation: Xiong Jinbo, Yao Zhiqiang, Ma Jianfeng, Li Fenghua, Li Qi. Action-Based Multilevel Access Control for Structured Document[J]. Journal of Computer Research and Development, 2013, 50(7): 1399-1408.

Action-Based Multilevel Access Control for Structured Document

More Information
  • Published Date: July 14, 2013
  • Cloud computing is a promising computing paradigm which has recently drawn extensive attention from both academia and industry. Meanwhile, structured document plays a vital role as information carrier in cloud computing. Therefore apparently, secure access to structured document is a key technology for the quality control of cloud services. In order to prevent information leakage and unauthorized access to the structured document, which is a common problem caused by lack of the multilevel security mechanism in current cloud computing environment, we propose an action-based multilevel access control model (referred to as the AMAC) and provide a formal description of access control policies. In our AMAC model, we employ noninterference theory in the information flow to establish AMAC noninterference model, and prove the security of multilevel access control policies in our AMAC model. Comparison and analysis with the existing access control models demonstrate that the AMAC model not only improves the flexibility of access control policies on the basis of roles, contexts and access actions, but also realizes multilevel security mechanism in terms of the security levels of the user, the access actions and the structured document.
  • Related Articles

    [1]Pei Zhongyi, Liu Lin, Wang Chen, Wang Jianmin. An Explainability-Centric Requirements Analysis Framework for Machine Learning Applications[J]. Journal of Computer Research and Development, 2024, 61(4): 983-1002. DOI: 10.7544/issn1000-1239.202220794
    [2]Jin Dongming, Jin Zhi, Chen Xiaohong, Wang Chunhui. ChatModeler: A Human-Machine Collaborative and Iterative Requirements Elicitation and Modeling Approach via Large Language Models[J]. Journal of Computer Research and Development, 2024, 61(2): 338-350. DOI: 10.7544/issn1000-1239.202330746
    [3]Song Rui, LiTong, Dong Xin, Ding Zhiming. A User Requirements Preference Analysis Method of Mobile Applications Based on Meta-Path Embedding[J]. Journal of Computer Research and Development, 2021, 58(4): 749-762. DOI: 10.7544/issn1000-1239.2021.20200737
    [4]Peng Zhenlian, Wang Jian, He Keqing, Tang Mingdong. A Requirements Elicitation Approach Based on Feature Model and Collaborative Filtering[J]. Journal of Computer Research and Development, 2016, 53(9): 2055-2066. DOI: 10.7544/issn1000-1239.2016.20150426
    [5]Wang Jin, Huang Zhiqiu. Privacy Requirement Modeling and Consistency Checking in Cloud Computing[J]. Journal of Computer Research and Development, 2015, 52(10): 2395-2410. DOI: 10.7544/issn1000-1239.2015.20150513
    [6]Li Qingyong, Liang Zhengping, Huang Yaping, Shi Zhongzhi. Sparseness Representation Model for Defect Detection and Its Application[J]. Journal of Computer Research and Development, 2014, 51(9): 1929-1935. DOI: 10.7544/issn1000-1239.2014.20140153
    [7]Liu Huaxiao, Jin Ying, and Ma Pengfei. An Approach to Requirements Change Impact Analysis[J]. Journal of Computer Research and Development, 2013, 50(8): 1769-1777.
    [8]Wu Huaiguang, Wu Guoqing, Chen Shu, and Wan Li. A Software Behavior Oriented Requirements Model and Properties Verification[J]. Journal of Computer Research and Development, 2011, 48(5): 869-876.
    [9]Ding Shuai, Lu Fujun, Yang Shanlin, Xia Chengyi. A Requirement-Driven Software Trustworthiness Evaluation and Evolution Model[J]. Journal of Computer Research and Development, 2011, 48(4): 647-655.
    [10]Shu Fengdi, Zhao Yuzhu, Wang Jizhe, Li Mingshu. User-Driven Requirements Elicitation Method with the Support of Personalized Domain Knowledge[J]. Journal of Computer Research and Development, 2007, 44(6): 1044-1052.
  • Cited by

    Periodical cited type(10)

    1. 何雪锋,周洁,陈德光,廖海. 自然语言处理的深度学习模型综述. 计算机应用与软件. 2025(02): 1-19+101 .
    2. 吴欢欢,谢瑞麟,乔塬心,陈翔,崔展齐. 基于可解释性分析的深度神经网络优化方法. 计算机研究与发展. 2024(01): 209-220 . 本站查看
    3. 桂韬,奚志恒,郑锐,刘勤,马若恬,伍婷,包容,张奇. 基于深度学习的自然语言处理鲁棒性研究综述. 计算机学报. 2024(01): 90-112 .
    4. 黄云,董天宇. 电力人工智能指标算法模型多场景鲁棒性评价方法. 吉林大学学报(信息科学版). 2024(01): 162-167 .
    5. 王小萌,张华,丁金扣,王稼慧. 一种随机束搜索文本攻击黑盒算法. 北京邮电大学学报. 2024(02): 24-29 .
    6. 王春东,孙嘉琪,杨文军. 基于矫正理解的中文文本对抗样本生成方法. 计算机工程. 2023(02): 37-45 .
    7. 王浩,唐桥虹,唐娜,郝烨,李澍,孟祥峰,李佳戈. 基于神经网络的心电分类算法抗扰性影响分析. 中国医疗设备. 2023(03): 61-65 .
    8. 刘颖,杨鹏飞,张立军,吴志林,冯元. 前馈神经网络和循环神经网络的鲁棒性验证综述. 软件学报. 2023(07): 3134-3166 .
    9. 吴舟婷,罗森林. 基于随机掩码和对抗训练的文本隐私保护实验. 实验技术与管理. 2023(08): 72-76 .
    10. 金志刚,周峻毅,何晓勇. 面向自然语言处理领域的对抗攻击研究与展望. 信息安全研究. 2022(03): 202-211 .

    Other cited types(17)

Catalog

    Article views (921) PDF downloads (704) Cited by(27)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return