首页> 外文学位 >Designing Secure Access Control Model in Cyber Social Networks
【24h】

Designing Secure Access Control Model in Cyber Social Networks

机译:在网络社交网络中设计安全访问控制模型

获取原文
获取原文并翻译 | 示例

摘要

Nowadays, information security in online communication has become an indisputable topic. People prefer pursuing their connection and public relations due to the greater flexibility and affordability of online communication. Recently, organizations have established online networking sites concerned with sharing assets among their employees. As more people engage in social network, requirements for protecting information and resources becomes vital. Over the years, many access control methods have been proposed. Although these methods cover various information security aspects, they have not provided an appropriate approach for securing information within distributed online networking sites. Moreover, none of the previous research provides an access control method in case an existing resource encompassing various parts and each part has its own accessing control policy.;In this research, we investigate the access control requirements in order to conserve data and encompassed resources, which are shared in the social network, from users with unapproved access. Under the proposed method, users are able to define policies easily to protect their individual information and resources from unauthorized users. In addition, requestors are able to generate inquiries in easy and efficient way. We define an appropriate format to present rules and queries, which are converted from policies and inquiries respectively. The proposed approach defines a method in case a user would like to access a resource belonging to another user where both users are members of different online networking sites. In order to add more flexibility, this method controls access to data and resources by evaluating requestor's attributes, object's attributes, action or operation taken by requestor, environmental condition, and policies which are created by users or a super user of social network to protect the users' resources. This approach is called Policy-Based Attribute Access Control (PBAAC). The policies defined to secure a resource may conflict with other policies. The proposed method offers an appropriate solution to resolve this issue. Due to achievement of better performance with regards to efficiency, this research analyzes the method to compromise simple rules, complex rules, or rules including several attributes. The results prove that simple rules provide better performance.
机译:如今,在线通信中的信息安全已成为不争的话题。人们更喜欢追求联系和公共关系,因为在线交流具有更大的灵活性和可负担性。最近,组织建立了与员工之间共享资产有关的在线社交网站。随着越来越多的人参与社交网络,保护信息和资源的要求变得至关重要。多年来,已经提出了许多访问控制方法。尽管这些方法涵盖了各种信息安全方面,但是它们尚未提供用于在分布式在线联网站点中保护信息安全的适当方法。此外,在现有资源涵盖各个部分并且每个部分都有自己的访问控制策略的情况下,先前的研究都没有提供访问控制方法。在本研究中,我们调查访问控制要求以节省数据和包含的资源,未经授权访问的用户会在社交网络中共享这些信息。在提出的方法下,用户能够轻松定义策略,以保护其个人信息和资源免受未经授权的用户的侵害。另外,请求者能够以简单有效的方式生成查询。我们定义了一种合适的格式来显示规则和查询,分别从策略和查询转换而来。所提出的方法定义了一种在用户想要访问属于另一个用户的资源的情况下的方法,其中两个用户都是不同的在线网站的成员。为了增加灵活性,此方法通过评估请求者的属性,对象的属性,请求者采取的行动或操作,环境条件以及由社交网络的用户或超级用户创建的策略来控制对数据和资源的访问,以保护社交网络用户资源。这种方法称为基于策略的属性访问控制(PBAAC)。为保护资源而定义的策略可能与其他策略冲突。所提出的方法提供了解决此问题的适当解决方案。由于在效率方面取得了更好的性能,因此本研究分析了折中简单规则,复杂规则或包含多个属性的规则的方法。结果证明,简单的规则可以提供更好的性能。

著录项

  • 作者

    Morovat, Katanosh.;

  • 作者单位

    University of Arkansas.;

  • 授予单位 University of Arkansas.;
  • 学科 Computer science.
  • 学位 Ph.D.
  • 年度 2017
  • 页码 176 p.
  • 总页数 176
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号