Access control security model based on behavior in cloud computing environment
In view of the current popular cloud computing technology,some security problems were analyzed.Based on BLP(Bell-LaPadula) model and Biba model,using the access control technology based on behavior to dynamic adjusting scope of subject's visit,it put forward the CCACSM ( cloud omputing access c...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2012-03-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/1000-436X(2012)03-0059-08/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841539928623677440 |
---|---|
author | Guo-yuan LIN Shan HE Hao HUANG Ji-yi WU Wei CHEN |
author_facet | Guo-yuan LIN Shan HE Hao HUANG Ji-yi WU Wei CHEN |
author_sort | Guo-yuan LIN |
collection | DOAJ |
description | In view of the current popular cloud computing technology,some security problems were analyzed.Based on BLP(Bell-LaPadula) model and Biba model,using the access control technology based on behavior to dynamic adjusting scope of subject's visit,it put forward the CCACSM ( cloud omputing access control security model).The model not only guarantees the cloud computing environment information privacy and integrity,and makes cloud computing environment with considerable flexibility and practical.At last,it gives the model's part,safety justice and realization process. |
format | Article |
id | doaj-art-eed7ec5072134d3599ed3e9cbd14f0cc |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2012-03-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-eed7ec5072134d3599ed3e9cbd14f0cc2025-01-14T06:31:23ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2012-03-0133596659660711Access control security model based on behavior in cloud computing environmentGuo-yuan LINShan HEHao HUANGJi-yi WUWei CHENIn view of the current popular cloud computing technology,some security problems were analyzed.Based on BLP(Bell-LaPadula) model and Biba model,using the access control technology based on behavior to dynamic adjusting scope of subject's visit,it put forward the CCACSM ( cloud omputing access control security model).The model not only guarantees the cloud computing environment information privacy and integrity,and makes cloud computing environment with considerable flexibility and practical.At last,it gives the model's part,safety justice and realization process.http://www.joconline.com.cn/zh/article/doi/1000-436X(2012)03-0059-08/cloud computingBLP modelBiba modelaccess control based on behavior |
spellingShingle | Guo-yuan LIN Shan HE Hao HUANG Ji-yi WU Wei CHEN Access control security model based on behavior in cloud computing environment Tongxin xuebao cloud computing BLP model Biba model access control based on behavior |
title | Access control security model based on behavior in cloud computing environment |
title_full | Access control security model based on behavior in cloud computing environment |
title_fullStr | Access control security model based on behavior in cloud computing environment |
title_full_unstemmed | Access control security model based on behavior in cloud computing environment |
title_short | Access control security model based on behavior in cloud computing environment |
title_sort | access control security model based on behavior in cloud computing environment |
topic | cloud computing BLP model Biba model access control based on behavior |
url | http://www.joconline.com.cn/zh/article/doi/1000-436X(2012)03-0059-08/ |
work_keys_str_mv | AT guoyuanlin accesscontrolsecuritymodelbasedonbehaviorincloudcomputingenvironment AT shanhe accesscontrolsecuritymodelbasedonbehaviorincloudcomputingenvironment AT haohuang accesscontrolsecuritymodelbasedonbehaviorincloudcomputingenvironment AT jiyiwu accesscontrolsecuritymodelbasedonbehaviorincloudcomputingenvironment AT weichen accesscontrolsecuritymodelbasedonbehaviorincloudcomputingenvironment |