• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Su Mang, Li Fenghua, Shi Guozhen. Action-Based Multi-level Access Control Model[J]. Journal of Computer Research and Development, 2014, 51(7): 1604-1613.
Citation: Su Mang, Li Fenghua, Shi Guozhen. Action-Based Multi-level Access Control Model[J]. Journal of Computer Research and Development, 2014, 51(7): 1604-1613.

Action-Based Multi-level Access Control Model

More Information
  • Published Date: July 14, 2014
  • The developments of communication, computer, and multimedia technologies have speeded up information transmission. The information has been becoming multi-dimensional. The multi-level security could not only ensure the correctness of information transmission, but also keep the integrality and confidentiality of the data. The traditional multi-level security models have been implemented with the classic access control models, such as RBAC (role-based access control), which solve the problems of multi-level access control to some extent. But they could not accommodate the users’ requirements of multi-level permission management at anytime and anywhere with the consideration of the temporal and environmental factors in the existing multi-level security access control mechanisms. How to implement the multi-level access control with the consideration of time and environment has become a problem to be solved. Firstly, we present an action-based multi-level access control model, which integrates the BLP and ABAC (action-based access control) together by extending the security level to action. Secondly, in order to solve the problem of permission specification with time and environment, we make the description of security level more detailed by defining the reading level (lr) and writing level (lw). The corresponding security rules and proof have been given. Finally, we give the implementing scheme of our model. By integrating the temporal state and environmental state together for the current complicated network, our scheme could solve the problems of the multi-level management and access control.
  • Related Articles

    [1]Yin Xiaokang, Lu Bin, Cai Ruijie, Zhu Xiaoya, Yang Qichao, Liu Shengli. Memory Copy Function Identification Technique with Control Flow and Data Flow Analysis[J]. Journal of Computer Research and Development, 2023, 60(2): 326-340. DOI: 10.7544/issn1000-1239.202110990
    [2]Yang Fan, Li Fei, Shu Jiwu. Survey on Secure Persistent Memory Storage[J]. Journal of Computer Research and Development, 2020, 57(5): 912-927. DOI: 10.7544/issn1000-1239.2020.20190820
    [3]Miao Dongjing, Liu Xianmin, Li Jianzhong. An Algorithm on Mining Approximate Functional Dependencies in Probabilistic Database[J]. Journal of Computer Research and Development, 2015, 52(12): 2857-2865. DOI: 10.7544/issn1000-1239.2015.20140685
    [4]Li Weibang, Li Zhanhuai, Chen Qun, Jiang Tao, Liu Hailong, Pan Wei. Functional Dependencies Discovering in Distributed Big Data[J]. Journal of Computer Research and Development, 2015, 52(2): 282-294. DOI: 10.7544/issn1000-1239.2015.20140229
    [5]Liu Xianmin, Li Jianzhong. Discovering Extended Conditional Functional Dependencies[J]. Journal of Computer Research and Development, 2015, 52(1): 130-140. DOI: 10.7544/issn1000-1239.2015.20130691
    [6]Xue Jinrong, An Qiusheng, Zheng Jun. Intent Reduction of Concept Lattice and Database Inference Dependence[J]. Journal of Computer Research and Development, 2014, 51(1): 96-103.
    [7]Zeng Kun and Yang Xuejun. A Best-Effort Hardware Transactional Memory Based on Dependency Graph[J]. Journal of Computer Research and Development, 2012, 49(1): 44-54.
    [8]Chen Chi, Feng Dengguo, and Xu Zhen. Research on Database Transaction Recovery Log and Intrusion Response[J]. Journal of Computer Research and Development, 2010, 47(10): 1797-1804.
    [9]Hao Zhongxiao, Li Yanjuan. Study on Membership Problem with Respect to Temporal Functional Dependencies and Temporal Multivalued Dependencies[J]. Journal of Computer Research and Development, 2006, 43(7): 1267-1272.
    [10]Lü Teng, Yan Ping. Functional Dependencies and Inference Rules for XML[J]. Journal of Computer Research and Development, 2005, 42(5): 792-796.

Catalog

    Article views (1250) PDF downloads (953) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return