2021 ◽  
Vol 11 (2) ◽  
pp. 17-31
Author(s):  
Lanfang Zhang ◽  
Zhiyong Zhang ◽  
Ting Zhao

With the rapid development of mobile internet, a large number of online social networking platforms and tools have been widely applied. As a classic method for protecting the privacy and information security of social users, access control technology is evolving with the spatio-temporal change of social application requirements and scenarios. However, nowadays there is a lack of effective theoretical model of social spatio-temporal access control as a guide. This paper proposed a novel spatio-temporal access control model for online social network (STAC) and its visual verification, combined with the advantages of discretionary access control, using formal language to describe the access control rules based on spatio-temporal, and real-life scenarios for access control policy description, realizes a more fine-grained access control mechanism for social network. By using the access control verification tool ACPT developed by NIST to visually verify the proposed model, the security and effectiveness of the STAC model are proved.


2011 ◽  
Vol 30 (2-3) ◽  
pp. 108-115 ◽  
Author(s):  
Barbara Carminati ◽  
Elena Ferrari ◽  
Raymond Heatherly ◽  
Murat Kantarcioglu ◽  
Bhavani Thuraisingham

2014 ◽  
Vol 940 ◽  
pp. 465-468
Author(s):  
Yu Wang ◽  
Yu Duan

This research proposes network access control model based on the trusted label. The model combines the admission access control of network device and the transmission access control of data flow effective, and uses the trusted computing technology to ensure the credibility of the generated label, and adopts the access control based on the security domain to locate the granularity of access control to every packets, reduces the probability of successful attack to the network based on the information flow, thereby improving the security control of the network.


Sign in / Sign up

Export Citation Format

Share Document