Title
Cyberspace-Oriented Access Control: Model and Policies
Abstract
With the rapid development of information technologies, our daily life has become deeply dependent on cyberspace. The new technologies provide more facilities and enhancements to the existing Internet services as it allows users more flexibility in terms of exploring webpages, sending messages or publishing tweets via cell phones or laptops. However, there are many security issues such as security policy definition and security policy enforcement of current cyberspace. In this paper, we study information access problems in cyberspace where users leverage devices via the Internet to access sensitive objects with temporal and spatial limitations. We propose a Cyberspace-oriented Access Control model (CoAC) to ensure the security of the mentioned accesses in cyberspace. The proposed model consists of seven atomic operations, such as Read, Write, Store, Execute, Publish, Forward and Select, which can denote all operations by the combination of several atomic operations in cyberspace. For each atomic operation, we assemble a suite of security policies and demonstrate its flexibility. By that, a series of security policies are denfined for CoAC.
Year
DOI
Venue
2017
10.1109/DSC.2017.100
2017 IEEE Second International Conference on Data Science in Cyberspace (DSC)
Keywords
Field
DocType
Cyberspace-Oriented Access Control,Model,Policies
World Wide Web,Computer security,Computer science,Information access,Information security,Cloud computing security,Access control,Security policy,Computer security model,The Internet,Cyberspace
Conference
ISBN
Citations 
PageRank 
978-1-5386-1601-7
0
0.34
References 
Authors
9
6
Name
Order
Citations
PageRank
Fenghua Li126334.70
Zifu Li211.04
Weili Han333833.30
ting wu43916.80
Lihua Chen523.46
Yunchuan Guo62714.25