{"title":"SaaS Access Control Research Based on UCON","authors":"Junliang Zhu, Q. Wen","doi":"10.1109/ICDH.2012.50","DOIUrl":null,"url":null,"abstract":"SaaS access control security issues become increasingly significant. How to ensure that user data's confidentiality, integrity and scalability has become the focus problems. To solve this problem, we have studied the usage control (UCON) model which can achieve dynamic access control by mutability of attributes and continuity of decisions. SaaS access control needs the duribility of obligations. However, UCON does not have this feature. In order to achieve fine-grained, and secure access control preferably, we propose a UCON post-obligation model. At the same time, we use set theory and logic predicates to define the UCON post-obligation model. On that basis, we combine different UCON models and features of SaaS, and put forward a common access control flow to achieve the user data's privacy protection.","PeriodicalId":308799,"journal":{"name":"2012 Fourth International Conference on Digital Home","volume":"106 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"14","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 Fourth International Conference on Digital Home","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICDH.2012.50","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 14
Abstract
SaaS access control security issues become increasingly significant. How to ensure that user data's confidentiality, integrity and scalability has become the focus problems. To solve this problem, we have studied the usage control (UCON) model which can achieve dynamic access control by mutability of attributes and continuity of decisions. SaaS access control needs the duribility of obligations. However, UCON does not have this feature. In order to achieve fine-grained, and secure access control preferably, we propose a UCON post-obligation model. At the same time, we use set theory and logic predicates to define the UCON post-obligation model. On that basis, we combine different UCON models and features of SaaS, and put forward a common access control flow to achieve the user data's privacy protection.