ABSTRACT
A role and node based access control model(RNBAC model) for industrial control network is proposed, which is aimed at satisfying the high-security requirements in the industrial control network by improving the problem of static authorization in a role-based access control model(RBAC model). The RNBAC model utilizes the deterministic characteristics of nodes in the industrial control network and the predictable characteristics of node information, and introduces a series of concepts such as nodes. First, give the formal definition of RNBAC model. Then, discuss the node trust calculation, user access threshold calculation and user trust value. Finally, verify that the RNBAC model can dynamically manage user access behavior in a scenario of the industrial control network, laying a foundation in the use of RNBAC model in the real environment.
- Ferraiolo D F, Kuhn D R. Role-based access control {C}. In Proceedings of the 15th National Computer Security Conference. Baltimore, USA, 1992, 08. 554--563.Google Scholar
- Sandhu R, Coyne E, Feinstein H, et al. Role-based access control models {J}. IEEE Computer, 1996, 02, 29(2): 38--47. Google ScholarDigital Library
- Sandhu R, Bhamidipati V, Munawer Q. The ARBAC97 model for role-based administration of roles {J}. ACM Transactions on Information and System Security, 1997, 2 (1): 105--135. Google ScholarDigital Library
- Ferraiolo D F, Sandhu R, Gavrila S, et al. Proposed NIST standard for role-based access control {J}. ACM Transactions on Information and System Security, 2001, 08, 4(3): 224--274. Google ScholarDigital Library
- Thomas R, Sandhu R. Task-based authorization controls (TBAC): A Family of models for active and enterprise oriented authorization management {A}. In Proceedings of the 11th IFIP WG11. 3 Conference on Database Security {C}.Lake Tahoe, 1997, 08. 166--181. Google ScholarDigital Library
- Freudenthal E, Pesin T, Port L, et al. dRBAC: Distributed role-based access control for dynamic coalition environments {A}.In Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS 02) {C}. Vienna, Austria, IEEE Computer Society, 2002, 07. 411--420. Google ScholarDigital Library
- Liu S Y, Huang J H. Role-based access control for distributed cooperation environment {A}. In Proceedings of 2009 International Conference on Computational Intelligence and Security{C}. Beijing, China, IEEE Computer Society, 2009, 12. 455--459. Google ScholarDigital Library
- Ma M C, Woodhead S. Constraint-enabled distributed RBAC for subscription-based remote network services {A}. In Proceedings of the Sixth IEEE International Conference on Computer and Information Techno logy (CIT 06) {C}. 2006, 09. 01--06. Google ScholarDigital Library
- Bertino E, Bonatti P, Ferrari E. TRBAC: A Temporal Role-Based Access Control Model {J}. ACM Transactions on Information and System Security, 2001, 08, 4(3): 191--223. Google ScholarDigital Library
- Jo shi J B D, Bertino, Latif U, et al. A generalized temporal Role-based access control model {J}. IEEE Transactions on Knowledge and Data Engineering, 2005, 01, 17(1): 04--23. Google ScholarDigital Library
- Yu Wanjun, Shen Bin, Zhou Lanfeng. Access control based on role and trust and its implementation on Hadoop{J}. Modern Electronics Technique, 2017, 12, 40(24), 9--14.Google Scholar
- Wang Yuding, Yang Jiahai. Data access control model based on data's role and attributes for cloud computing{J}. J Tsinghua Univ (Sci & Technol), 2017, Vol.57, No.11, 1150--1158.Google Scholar
- Xing Xuliang, Tian Xiuxia. A Novel Trust-based Dynamic Access Control Model{J}. Journal of Shanghai University of Electric Power, 2017, 12, Vol.33, No.6, 591--596.Google Scholar
- Lei Lei, Cai Quanwei, Jing Jiwu, el at. Enforcing access control on encrypted cloud storage with policy hiding{J}. Ruan Jian Xue Bao/Journal of software, 2016, 27(06), 1432--1450.Google Scholar
- Fang Liang, Yin Lihua, Guo Yunchuan, Fang Binxing. A Survey of Key Technologies in Attribute-Based Access Control Scheme, 2016, Vol.39: Online Publishing No.79.Google Scholar
- Li Fenghua, Wang Yanchao, Yin Lihua. Novel cyberspace-oriented access control model, Journey on Communications, 2016, Vol37, No5, 9--20.Google Scholar
Index Terms
- A Role and Node Based Access Control Model for Industrial Control Network
Recommendations
Task-role-based access control model
There are many information objects and users in a large company. It is an important issue how to control user's access in order that only authorized user can access information objects. Traditional access control models-- discretionary access control, ...
An Evaluation of Role Based Access Control Towards Easier Management Compared to Tight Security
ICFNDS '17: Proceedings of the International Conference on Future Networks and Distributed SystemsRole-based access control (RBAC) is a widely-used protocol to design and build an access control for providing the system security regarding authorization. Even though in the context of internet resources access, the authentication and access control ...
Configuring role-based access control to enforce mandatory and discretionary access control policies
Access control models have traditionally included mandatory access control (or lattice-based access control) and discretionary access control. Subsequently, role-based access control has been introduced, along with claims that its mechanisms are general ...
Comments