• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
搜索

Author:

Zhang, Yixuan (Zhang, Yixuan.) | He, Jingsha (He, Jingsha.) (Scholars:何泾沙) | Zhao, Bin (Zhao, Bin.) | Huang, Zhiqing (Huang, Zhiqing.) | Liu, Ruohong (Liu, Ruohong.)

Indexed by:

EI Scopus SCIE

Abstract:

Access control is a core security technology which has been widely used in computer systems and networks to protect sensitive information and critical resources and to counter malicious attacks. Although many access control models have been developed in the past, such as discretionary access control (DAC), mandatory access control (MAC) and role-based access control (RBAC), these models are designed primarily as a defensive measure in that they are used for examining access requests and making authorization decisions based on established access control policies. As the result, even after a malicious access is identified, the requester can still keep issuing more malicious access requests without much fear of punitive consequences from the access control system in subsequent accesses. Such access control may be acceptable in closed systems and networks but is not adequate in open systems and networks where the real identities and other critical information about requesters may not be known to the systems and networks. In this paper, we propose to design pro-active access control so that access control systems can respond to malicious access pro-actively to suit the needs of open systems and networks. We will first apply some established principles in the Game Theory to analyze current access control models to identify the limitations that make them inadequate in open systems and networks. To design pro-active access control (PAC), we incorporate a constraint mechanism that includes feedback and evaluation components and show based on the Game Theory how to make such access control respond to malicious access in a pro-active manner. We also present a framework design of PAC and demonstrate through the implementation of trust-based access control the feasibility of design, implementation and application of pro-active access control. Such kind of models and mechanisms can serve as the foundation for the design of access control systems that will be made more effective in deterring malicious attacks in open systems and networks. (C) 2014 Elsevier Ltd. All rights reserved.

Keyword:

Access control Evaluation Payoffs Game theory Security Trust

Author Community:

  • [ 1 ] [Zhang, Yixuan]Beijing Univ Technol, Sch Software Engn, Beijing 100124, Peoples R China
  • [ 2 ] [He, Jingsha]Beijing Univ Technol, Sch Software Engn, Beijing 100124, Peoples R China
  • [ 3 ] [Zhao, Bin]Beijing Univ Technol, Sch Software Engn, Beijing 100124, Peoples R China
  • [ 4 ] [Huang, Zhiqing]Beijing Univ Technol, Sch Software Engn, Beijing 100124, Peoples R China
  • [ 5 ] [He, Jingsha]Beijing Dev Area Co Ltd, Gen Adm Dept, Beijing 100176, Peoples R China
  • [ 6 ] [Liu, Ruohong]Beijing Dev Area Co Ltd, Gen Adm Dept, Beijing 100176, Peoples R China

Reprint Author's Address:

  • 何泾沙

    [He, Jingsha]Beijing Univ Technol, Sch Software Engn, Beijing 100124, Peoples R China

Show more details

Related Keywords:

Related Article:

Source :

COMPUTERS & SECURITY

ISSN: 0167-4048

Year: 2015

Volume: 49

Page: 132-146

5 . 6 0 0

JCR@2022

ESI Discipline: COMPUTER SCIENCE;

ESI HC Threshold:168

JCR Journal Grade:2

CAS Journal Grade:3

Cited Count:

WoS CC Cited Count: 5

SCOPUS Cited Count: 10

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 11

Online/Total:1427/10545306
Address:BJUT Library(100 Pingleyuan,Chaoyang District,Beijing 100124, China Post Code:100124) Contact Us:010-67392185
Copyright:BJUT Library Technical Support:Beijing Aegean Software Co., Ltd.