English 
黄志球

教授

招生学科专业:
计算机科学与技术 -- 【招收博士、硕士研究生】 -- 计算机科学与技术学院
软件工程 -- 【招收博士、硕士研究生】 -- 计算机科学与技术学院
网络空间安全 -- 【招收博士、硕士研究生】 -- 计算机科学与技术学院
电子信息 -- 【招收博士、硕士研究生】 -- 计算机科学与技术学院

毕业院校:南京航空航天大学

学历:南京航空航天大学

学位:工学博士学位

所在单位:计算机科学与技术学院/人工智能学院/软件学院

联系方式:025-84892400

电子邮箱:

手机版

访问量:

最后更新时间:..

当前位置: 主页 >> 科学研究 >> 论文成果
A topology-aware access control model for collaborative cyber-physical spaces: Specification and verification

点击次数:

所属单位:计算机科学与技术学院/人工智能学院/软件学院

发表刊物:Comput Secur

摘要:In collaborative environment, distributed multiple cyber-physical spaces interoperate with each other aiming to provide an intelligent spatial environment for their users to conduct their collaborative activities. Subjects and objects roam in the physical and cyber spaces among domains to support the completion of the activities. These dynamic behaviors bring great challenges to security issue. The actions of roaming subjects and roaming objects need to be specified and checked against security requirements of constituent domains. However, the existing inter-domain access control models was proposed for the traditional information system and focus on the cyber security. They cannot deal with the intricacies of cross-domain access requests in cyber-physical spaces. In this paper, we propose a formal inter-domain model to specify cyber-physical access control policies and a model checking approach to ensure security requirements hold in these policies. We first present a formal definition of the topology configuration to capture the environment characteristics of the cyber-physical spaces. It provides important contextual information for the access control system. Then, based on topology attributes defined in the topology configuration, a topology-aware inter-domain access control model TA-CPAC is proposed. It can adjust the permission assignment adaptively to react to the behaviors changes of subjects and objects. Next, the topology configuration and TA-CPAC model are formalized by the use of bigraphs and bigraphs reactive systems respectively, which allows us to utilize the model checking technology to reason about that whether the behaviors of roaming subjects and objects satisfy security requirements of all constituent domains. Finally, the effectiveness of our approach is evaluated by a collaborative scenario in a smart city. © 2019 Elsevier Ltd

ISSN号:0167-4048

是否译文:

发表时间:2019-11-01

合写作者:Cao, Yan,W00137,谢健,Wang, Jinyong

通讯作者:黄志球

版权所有©2018- 南京航空航天大学·信息化处(信息化技术中心)