首页 | 本学科首页   官方微博 | 高级检索  
     

一种基于UML模型的起源感知访问控制策略分析方法
引用本文:孙连山,祁志斌,侯涛.一种基于UML模型的起源感知访问控制策略分析方法[J].计算机工程与科学,2015,37(6):1114-1126.
作者姓名:孙连山  祁志斌  侯涛
作者单位:1. 陕西科技大学电气与信息工程学院,陕西西安,710021
2. 中国石油长庆油田公司资金结算中心,陕西西安,710021
基金项目:国家自然科学基金资助项目,陕西省教育厅自然科学专项
摘    要:起源(Provenance)是记录数据演变历史的元数据。最近研究者提出起源感知的访问控制,通过追溯和分析访问者或被访问对象的起源来决定允许或拒绝访问请求。由于起源通常由系统在运行时记录并呈现为复杂的有向图,识别、规约和管理起源感知的访问控制策略非常困难。为此,提出了一个基于UML模型的起源感知访问控制策略分析方法,包括对复杂起源图的抽象建模技术以及一个在面向对象的软件开发过程中系统地建立起源模型、规约起源感知访问控制策略的参考过程指南。最后结合企业在线培训系统案例说明如何应用所提出的方法。

关 键 词:起源  起源模型  访问控制  UML  安全工程
收稿时间:2014-01-24
修稿时间:2014-08-14

A UML model-based analysis approach for provenance-aware access control policies
SUN Lian-shan,QI Zhi-bin,HOU Tao.A UML model-based analysis approach for provenance-aware access control policies[J].Computer Engineering & Science,2015,37(6):1114-1126.
Authors:SUN Lian-shan  QI Zhi-bin  HOU Tao
Affiliation:(1.College of Electrical and Information Engineering,Shaanxi University of Science and Technology,Xi’an 710021; 2.Settlement Center,Petrochina Changqing Oilfield Company,Xi’an 710021,China)
Abstract:Provenance is the historical meta data of data objects. It has recently been used to enable provenance based access control (PBAC), which grants or denies an access request according to the provenance of either the subjects or the objects. However, provenance can only be collected at run time via complex directed acyclic graphs, so it is very difficult for security architects to efficiently specify PBAC policies due to the complexity of provenance graphs and its unavailability at design time. We explore a UML model based approach to analyze PBAC policies. Specifically, we first introduce a conceptual provenance model to shield the complexity of the provenance graphs and to enable policy analysis at the design time. We then introduce a UML model based process to guide the analysis of the conceptual provenance model and the PBAC policies along with the object oriented development. We validate the proposed approach within an enterprise online training system.
Keywords:provenance  provenance model  access control  UML  security engineering
本文献已被 万方数据 等数据库收录!
点击此处可从《计算机工程与科学》浏览原始摘要信息
点击此处可从《计算机工程与科学》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号