Abstract | ||
---|---|---|
With the rapid development of information technologies, our daily life has become deeply dependent on cyberspace. The new technologies provide more facilities and enhancements to the existing Internet services as it allows users more flexibility in terms of exploring webpages, sending messages or publishing tweets via cell phones or laptops. However, there are many security issues such as security policy definition and security policy enforcement of current cyberspace. In this paper, we study information access problems in cyberspace where users leverage devices via the Internet to access sensitive objects with temporal and spatial limitations. We propose a Cyberspace-oriented Access Control model (CoAC) to ensure the security of the mentioned accesses in cyberspace. The proposed model consists of seven atomic operations, such as Read, Write, Store, Execute, Publish, Forward and Select, which can denote all operations by the combination of several atomic operations in cyberspace. For each atomic operation, we assemble a suite of security policies and demonstrate its flexibility. By that, a series of security policies are denfined for CoAC. |
Year | DOI | Venue |
---|---|---|
2017 | 10.1109/DSC.2017.100 | 2017 IEEE Second International Conference on Data Science in Cyberspace (DSC) |
Keywords | Field | DocType |
Cyberspace-Oriented Access Control,Model,Policies | World Wide Web,Computer security,Computer science,Information access,Information security,Cloud computing security,Access control,Security policy,Computer security model,The Internet,Cyberspace | Conference |
ISBN | Citations | PageRank |
978-1-5386-1601-7 | 0 | 0.34 |
References | Authors | |
9 | 6 |
Name | Order | Citations | PageRank |
---|---|---|---|
Fenghua Li | 1 | 263 | 34.70 |
Zifu Li | 2 | 1 | 1.04 |
Weili Han | 3 | 338 | 33.30 |
ting wu | 4 | 39 | 16.80 |
Lihua Chen | 5 | 2 | 3.46 |
Yunchuan Guo | 6 | 27 | 14.25 |