Yan Cao , Changbo Ke , Dajuan Fan , Yuan Ping , Quanxin Yang , MengKe Yao
{"title":"State-aware access control for cyber-physical-social space: Model and policy security assurance","authors":"Yan Cao , Changbo Ke , Dajuan Fan , Yuan Ping , Quanxin Yang , MengKe Yao","doi":"10.1016/j.eij.2025.100749","DOIUrl":null,"url":null,"abstract":"<div><div>The cyber–physical-social space provides its users with a comfortable and convenient environment for work or living, achieved through the integration of state information from the cyber world, the physical world and the social world. While this integration creates a smart environment, it also presents a significant challenge to access control methods. This paper addresses the evolving access control requirements in the cyber–physical-social space and introduces a state-aware access control model along with an access control policy security assurance mechanism. To articulate the contextual state and state transformations in the cyber, physical, and social worlds, we propose the cyber–physical-social state description method. Building upon this method, we construct a state-aware access control model to precisely define the security requirements of the cyber–physical-social space. Additionally, we introduce a liveness requirement-oriented access control policy generation method and a safety requirement verification method to analyze how changes in the state of humans, cyber data, and physical entities impact authorization. Through a case study involving an intelligent hospital, we demonstrate that the proposed model possesses rich semantics and effectively conveys the security requirements of the cyber–physical-social space. The access control policy set, generated using our proposed methods, successfully avoids issues of missing and incorrect authorizations, ensuring a robust and reliable security system.</div></div>","PeriodicalId":56010,"journal":{"name":"Egyptian Informatics Journal","volume":"31 ","pages":"Article 100749"},"PeriodicalIF":4.3000,"publicationDate":"2025-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Egyptian Informatics Journal","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1110866525001422","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE","Score":null,"Total":0}
引用次数: 0
Abstract
The cyber–physical-social space provides its users with a comfortable and convenient environment for work or living, achieved through the integration of state information from the cyber world, the physical world and the social world. While this integration creates a smart environment, it also presents a significant challenge to access control methods. This paper addresses the evolving access control requirements in the cyber–physical-social space and introduces a state-aware access control model along with an access control policy security assurance mechanism. To articulate the contextual state and state transformations in the cyber, physical, and social worlds, we propose the cyber–physical-social state description method. Building upon this method, we construct a state-aware access control model to precisely define the security requirements of the cyber–physical-social space. Additionally, we introduce a liveness requirement-oriented access control policy generation method and a safety requirement verification method to analyze how changes in the state of humans, cyber data, and physical entities impact authorization. Through a case study involving an intelligent hospital, we demonstrate that the proposed model possesses rich semantics and effectively conveys the security requirements of the cyber–physical-social space. The access control policy set, generated using our proposed methods, successfully avoids issues of missing and incorrect authorizations, ensuring a robust and reliable security system.
期刊介绍:
The Egyptian Informatics Journal is published by the Faculty of Computers and Artificial Intelligence, Cairo University. This Journal provides a forum for the state-of-the-art research and development in the fields of computing, including computer sciences, information technologies, information systems, operations research and decision support. Innovative and not-previously-published work in subjects covered by the Journal is encouraged to be submitted, whether from academic, research or commercial sources.