Paper 2015/637

A Novel Cyberspace-Oriented Access Control Model

Fenghua Li, Yanchao Wang, Rongna Xie, Jinbo Xiong, and Fangfang Shan

Abstract

With the developments of mobile communication, networks and information technology, many new information service patterns and dissemination modes emerge with some security and privacy threats in access control, i.e., the ownership of data is separated from the administration of them, secondary/mutiple information distribution etc. Existing access control models, which are always proposed for some specific scenarios, are hardly to achieve fine-grained and adaptive access control. In this paper, we propose a novel Cyberspace-oriented Access Control model, termed as CoAC, which avoids the aforementioned threats by comprehensively considering some vital factors, such as the access requesting entity, general tense, access point, resource, device, networks, internet-based interactive graph and chain of resource transmission. By appropriately adjusting these factors, CoAC covers most of typical access control models and fulfills the requirements of new information service patterns and dissemination modes. We also present the administrative model of our proposed CoAC model and formally describe the administrative functions and methods used in the administrative model by utilizing Z-notation. Our CoAC is flexible and scalable, it can be further refined and expanded to figure out new opportunities and challenges in the upcoming access control techniques.

Metadata
Available format(s)
PDF
Publication info
Preprint.
Keywords
Cyberspace SecurityAccess ControlAdministrative SceneInformation Service PatternInformation Dissemination Mode
Contact author(s)
fhli @ iie ac cn
History
2015-07-02: revised
2015-06-30: received
See all versions
Short URL
https://ia.cr/2015/637
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2015/637,
      author = {Fenghua Li and Yanchao Wang and Rongna Xie and Jinbo Xiong and Fangfang Shan},
      title = {A Novel Cyberspace-Oriented Access Control Model},
      howpublished = {Cryptology ePrint Archive, Paper 2015/637},
      year = {2015},
      note = {\url{https://eprint.iacr.org/2015/637}},
      url = {https://eprint.iacr.org/2015/637}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.