Cross-Domain Access Control Encryption: Arbitrary-policy, Constant-size, Efficient

Author(s):  
Xiuhua Wang ◽  
Sherman S. M. Chow
2020 ◽  
Vol 30 (11n12) ◽  
pp. 1851-1865
Author(s):  
Yunpeng Zhang ◽  
Xin Liu

The distributed multiple autonomous network has become the main trend of modern information systems, such as Cloud, Service-Oriented Architecture (SOA) and Internet of Things (IoT). Access control in such a heterogeneous and dynamic system has become a major information security challenge, which hinders the sharing of resources and information. In this work, we present an Attribute-Based Access Control (ABAC) model for cross-domain access control. The proposed access control model comprises a boundary control server designed to provide cross-domain access control capability. An eXtensible Access Control Markup Language (XACML) policy model-based implementation is introduced. Process and implementation show the proposed model alleviates the security risk on the domain boundary during the cross-domain access control process.


2020 ◽  
Vol 53 ◽  
pp. 102503 ◽  
Author(s):  
Soumya Banerjee ◽  
Sandip Roy ◽  
Vanga Odelu ◽  
Ashok Kumar Das ◽  
Samiran Chattopadhyay ◽  
...  

2014 ◽  
Vol 513-517 ◽  
pp. 941-946 ◽  
Author(s):  
Chao Wang ◽  
Ji Zhou Chen ◽  
Yu Jun Liu ◽  
An Qi Li

In order to eliminate the security threats faced by the information systems of large organizations which usually involve multiple autonomous domains, this paper introduces an architecture of access control collaboration, which takes a distributed authoritative domain as the leading core of the unified cross-domain access control. Through applying the ABAC model in the authoritative domain, the global strategies formulated by the authoritative domain can be compatible with those local strategies of each autonomous domain. The global strategies are designed to be described by a group of authoritative attributes, which are limited in quantity but adequate to generalize all the subjects within the global scope. For system realization, a rule-based dynamic mechanism of attributes conversion is used to automatically generate the information of authoritative attributes. The cross-domain access control method in this paper can be directly applied to typical large organizations, such as government, military and large enterprises.


2017 ◽  
Vol 5 (4) ◽  
pp. 617-627 ◽  
Author(s):  
Wei Teng ◽  
Geng Yang ◽  
Yang Xiang ◽  
Ting Zhang ◽  
Dongyang Wang

Sign in / Sign up

Export Citation Format

Share Document