Research on access control for secure cross-domain data circulation
To address security risks such as tampering, leakage, and misuse of information stemming from inconsistent authorization mechanisms in data element circulation, the focus was placed on secure cross-domain data circulation. Initially, the challenges associated with cross-domain data access control we...
Saved in:
| Main Authors: | , , , , |
|---|---|
| Format: | Article |
| Language: | zho |
| Published: |
Editorial Department of Journal on Communications
2025-04-01
|
| Series: | Tongxin xuebao |
| Subjects: | |
| Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2025042/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1849728499066077184 |
|---|---|
| author | LI Heng LI Fenghua SHI Xinyi GUO Yunchuan GUO Shoukun |
| author_facet | LI Heng LI Fenghua SHI Xinyi GUO Yunchuan GUO Shoukun |
| author_sort | LI Heng |
| collection | DOAJ |
| description | To address security risks such as tampering, leakage, and misuse of information stemming from inconsistent authorization mechanisms in data element circulation, the focus was placed on secure cross-domain data circulation. Initially, the challenges associated with cross-domain data access control were systematically examined, followed by an in-depth investigation into the fundamental concepts of cross-domain data circulation and the essential implications of cross-domain access control. Subsequently, a comprehensive review was conducted on access control technologies for secure cross-domain data circulation, which encompassed: access control models categorized as provenance-based, purpose-based, and cyberspace-oriented approaches; key policy management technologies involving label mining for policies, policy negotiation and generation, conflict detection and resolution, policy propagation and enforcement, and auditing of anomalous policy execution; policy implementation mechanisms developed based on blockchain technology, data capsules, and data infrastructure. Finally, current challenges in cross-domain data circulation are systematically summarized, and future research directions are proposed. |
| format | Article |
| id | doaj-art-b024c3f5387549b9b43ad64fb0aa85ef |
| institution | DOAJ |
| issn | 1000-436X |
| language | zho |
| publishDate | 2025-04-01 |
| publisher | Editorial Department of Journal on Communications |
| record_format | Article |
| series | Tongxin xuebao |
| spelling | doaj-art-b024c3f5387549b9b43ad64fb0aa85ef2025-08-20T03:09:32ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2025-04-0146238254100122657Research on access control for secure cross-domain data circulationLI HengLI FenghuaSHI XinyiGUO YunchuanGUO ShoukunTo address security risks such as tampering, leakage, and misuse of information stemming from inconsistent authorization mechanisms in data element circulation, the focus was placed on secure cross-domain data circulation. Initially, the challenges associated with cross-domain data access control were systematically examined, followed by an in-depth investigation into the fundamental concepts of cross-domain data circulation and the essential implications of cross-domain access control. Subsequently, a comprehensive review was conducted on access control technologies for secure cross-domain data circulation, which encompassed: access control models categorized as provenance-based, purpose-based, and cyberspace-oriented approaches; key policy management technologies involving label mining for policies, policy negotiation and generation, conflict detection and resolution, policy propagation and enforcement, and auditing of anomalous policy execution; policy implementation mechanisms developed based on blockchain technology, data capsules, and data infrastructure. Finally, current challenges in cross-domain data circulation are systematically summarized, and future research directions are proposed.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2025042/cross-domain access controldata elements circulationdata usage controlextended controldata security |
| spellingShingle | LI Heng LI Fenghua SHI Xinyi GUO Yunchuan GUO Shoukun Research on access control for secure cross-domain data circulation Tongxin xuebao cross-domain access control data elements circulation data usage control extended control data security |
| title | Research on access control for secure cross-domain data circulation |
| title_full | Research on access control for secure cross-domain data circulation |
| title_fullStr | Research on access control for secure cross-domain data circulation |
| title_full_unstemmed | Research on access control for secure cross-domain data circulation |
| title_short | Research on access control for secure cross-domain data circulation |
| title_sort | research on access control for secure cross domain data circulation |
| topic | cross-domain access control data elements circulation data usage control extended control data security |
| url | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2025042/ |
| work_keys_str_mv | AT liheng researchonaccesscontrolforsecurecrossdomaindatacirculation AT lifenghua researchonaccesscontrolforsecurecrossdomaindatacirculation AT shixinyi researchonaccesscontrolforsecurecrossdomaindatacirculation AT guoyunchuan researchonaccesscontrolforsecurecrossdomaindatacirculation AT guoshoukun researchonaccesscontrolforsecurecrossdomaindatacirculation |