{"title":"基于零信任架构的动态访问控制与授权系统","authors":"Qigui Yao, Qi Wang, Xiaojian Zhang, Jiaxuan Fei","doi":"10.1145/3437802.3437824","DOIUrl":null,"url":null,"abstract":"With the development of cloud computing, artificial intelligence, big data and other technologies, network systems are facing more and more security risks and threats. The traditional security architecture based on border protection cannot meet the increasing security protection requirements. The zero-trust security architecture which has the characteristics of continuous identity authentication and minimized authority allocation can adapt to the security protection requirements of most current network systems. Based on the zero-trust security architecture, a dynamic access control and authorization system is proposed. User portraits and user trust are generated according to user behavior. Real-time hierarchical control in different scenarios is used in the system to achieve dynamic and fine-grained access control and authorization.","PeriodicalId":429866,"journal":{"name":"Proceedings of the 2020 1st International Conference on Control, Robotics and Intelligent System","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"22","resultStr":"{\"title\":\"Dynamic Access Control and Authorization System based on Zero-trust architecture\",\"authors\":\"Qigui Yao, Qi Wang, Xiaojian Zhang, Jiaxuan Fei\",\"doi\":\"10.1145/3437802.3437824\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the development of cloud computing, artificial intelligence, big data and other technologies, network systems are facing more and more security risks and threats. The traditional security architecture based on border protection cannot meet the increasing security protection requirements. The zero-trust security architecture which has the characteristics of continuous identity authentication and minimized authority allocation can adapt to the security protection requirements of most current network systems. Based on the zero-trust security architecture, a dynamic access control and authorization system is proposed. User portraits and user trust are generated according to user behavior. Real-time hierarchical control in different scenarios is used in the system to achieve dynamic and fine-grained access control and authorization.\",\"PeriodicalId\":429866,\"journal\":{\"name\":\"Proceedings of the 2020 1st International Conference on Control, Robotics and Intelligent System\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-10-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"22\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 2020 1st International Conference on Control, Robotics and Intelligent System\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3437802.3437824\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2020 1st International Conference on Control, Robotics and Intelligent System","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3437802.3437824","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Dynamic Access Control and Authorization System based on Zero-trust architecture
With the development of cloud computing, artificial intelligence, big data and other technologies, network systems are facing more and more security risks and threats. The traditional security architecture based on border protection cannot meet the increasing security protection requirements. The zero-trust security architecture which has the characteristics of continuous identity authentication and minimized authority allocation can adapt to the security protection requirements of most current network systems. Based on the zero-trust security architecture, a dynamic access control and authorization system is proposed. User portraits and user trust are generated according to user behavior. Real-time hierarchical control in different scenarios is used in the system to achieve dynamic and fine-grained access control and authorization.