{"title":"基于UCON的SaaS访问控制研究","authors":"Junliang Zhu, Q. Wen","doi":"10.1109/ICDH.2012.50","DOIUrl":null,"url":null,"abstract":"SaaS access control security issues become increasingly significant. How to ensure that user data's confidentiality, integrity and scalability has become the focus problems. To solve this problem, we have studied the usage control (UCON) model which can achieve dynamic access control by mutability of attributes and continuity of decisions. SaaS access control needs the duribility of obligations. However, UCON does not have this feature. In order to achieve fine-grained, and secure access control preferably, we propose a UCON post-obligation model. At the same time, we use set theory and logic predicates to define the UCON post-obligation model. On that basis, we combine different UCON models and features of SaaS, and put forward a common access control flow to achieve the user data's privacy protection.","PeriodicalId":308799,"journal":{"name":"2012 Fourth International Conference on Digital Home","volume":"106 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"14","resultStr":"{\"title\":\"SaaS Access Control Research Based on UCON\",\"authors\":\"Junliang Zhu, Q. Wen\",\"doi\":\"10.1109/ICDH.2012.50\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"SaaS access control security issues become increasingly significant. How to ensure that user data's confidentiality, integrity and scalability has become the focus problems. To solve this problem, we have studied the usage control (UCON) model which can achieve dynamic access control by mutability of attributes and continuity of decisions. SaaS access control needs the duribility of obligations. However, UCON does not have this feature. In order to achieve fine-grained, and secure access control preferably, we propose a UCON post-obligation model. At the same time, we use set theory and logic predicates to define the UCON post-obligation model. On that basis, we combine different UCON models and features of SaaS, and put forward a common access control flow to achieve the user data's privacy protection.\",\"PeriodicalId\":308799,\"journal\":{\"name\":\"2012 Fourth International Conference on Digital Home\",\"volume\":\"106 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-11-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"14\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 Fourth International Conference on Digital Home\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICDH.2012.50\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 Fourth International Conference on Digital Home","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICDH.2012.50","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
SaaS access control security issues become increasingly significant. How to ensure that user data's confidentiality, integrity and scalability has become the focus problems. To solve this problem, we have studied the usage control (UCON) model which can achieve dynamic access control by mutability of attributes and continuity of decisions. SaaS access control needs the duribility of obligations. However, UCON does not have this feature. In order to achieve fine-grained, and secure access control preferably, we propose a UCON post-obligation model. At the same time, we use set theory and logic predicates to define the UCON post-obligation model. On that basis, we combine different UCON models and features of SaaS, and put forward a common access control flow to achieve the user data's privacy protection.