TY - GEN
T1 - RuleSN
T2 - 2nd IEEE International Conference on Big Data Security on Cloud, IEEE BigDataSecurity 2016, 2nd IEEE International Conference on High Performance and Smart Computing, IEEE HPSC 2016 and IEEE International Conference on Intelligent Data and Security, IEEE IDS 2016
AU - Ma, Li
AU - Tao, Lixin
AU - Zhong, Yong
AU - Gai, Keke
N1 - Publisher Copyright:
© 2016 IEEE.
PY - 2016/6/30
Y1 - 2016/6/30
N2 - Current rapid increasing implementations in data diversity, autonomy and dynamic privilege management, fine-grained access control in social networks have resulted in various challenges in applying existing access control models. We focus on this issue and propose a new social network access control model, RuleSN, using logical authorization language. The model provides high performance of authorization expressiveness and flexibility that can perfectly describe relations of User to User (U2U), User to Resource (U2R), Resource to Resource (R2R) and attributes of users and resources. First, this paper elaborates the formal definitions of the RuleSN model. Second, we describe the model's authorization specification and verification policies and explain the syntax and semantics of the authorization language. Finally, the implementation, application and expressiveness of the model discussed by examples.
AB - Current rapid increasing implementations in data diversity, autonomy and dynamic privilege management, fine-grained access control in social networks have resulted in various challenges in applying existing access control models. We focus on this issue and propose a new social network access control model, RuleSN, using logical authorization language. The model provides high performance of authorization expressiveness and flexibility that can perfectly describe relations of User to User (U2U), User to Resource (U2R), Resource to Resource (R2R) and attributes of users and resources. First, this paper elaborates the formal definitions of the RuleSN model. Second, we describe the model's authorization specification and verification policies and explain the syntax and semantics of the authorization language. Finally, the implementation, application and expressiveness of the model discussed by examples.
KW - RuleSN
KW - Social network
KW - access control
KW - authorization language
KW - cybersecurity
KW - privilege management
UR - http://www.scopus.com/inward/record.url?scp=84979763342&partnerID=8YFLogxK
U2 - 10.1109/BigDataSecurity-HPSC-IDS.2016.67
DO - 10.1109/BigDataSecurity-HPSC-IDS.2016.67
M3 - Conference contribution
AN - SCOPUS:84979763342
T3 - Proceedings - 2nd IEEE International Conference on Big Data Security on Cloud, IEEE BigDataSecurity 2016, 2nd IEEE International Conference on High Performance and Smart Computing, IEEE HPSC 2016 and IEEE International Conference on Intelligent Data and Security, IEEE IDS 2016
SP - 418
EP - 423
BT - Proceedings - 2nd IEEE International Conference on Big Data Security on Cloud, IEEE BigDataSecurity 2016, 2nd IEEE International Conference on High Performance and Smart Computing, IEEE HPSC 2016 and IEEE International Conference on Intelligent Data and Security, IEEE IDS 2016
A2 - Qiu, Meikang
PB - Institute of Electrical and Electronics Engineers Inc.
Y2 - 9 April 2016 through 10 April 2016
ER -