• 中国计算机学会会刊
  • 中国科技核心期刊
  • 中文核心期刊

J4 ›› 2015, Vol. 37 ›› Issue (06): 1114-1126.

• 论文 • 上一篇    下一篇

一种基于UML模型的起源感知访问控制策略分析方法

孙连山1,祁志斌2,侯涛1   

  1. (1.陕西科技大学电气与信息工程学院,陕西 西安 710021;
    2.中国石油长庆油田公司资金结算中心,陕西 西安 710021)
  • 收稿日期:2014-01-24 修回日期:2014-08-14 出版日期:2015-06-25 发布日期:2014-08-14
  • 基金资助:

    国家自然科学基金资助项目(61202019);陕西省教育厅自然科学专项 (14JK1098)

A UML model-based analysis approach for 
provenance-aware access control policies  

SUN Lianshan1,QI Zhibin2,HOU Tao1   

  1. (1.College of Electrical and Information Engineering,Shaanxi University of Science and Technology,Xi’an 710021;
    2.Settlement Center,Petrochina Changqing Oilfield Company,Xi’an 710021,China)
  • Received:2014-01-24 Revised:2014-08-14 Online:2015-06-25 Published:2014-08-14

摘要:

起源(Provenance)是记录数据演变历史的元数据。 最近研究者提出起源感知的访问控制,通过追溯和分析访问者或被访问对象的起源来决定允许或拒绝访问请求。 由于起源通常由系统在运行时记录并呈现为复杂的有向图,识别、规约和管理起源感知的访问控制策略非常困难。 为此,提出了一个基于UML模型的起源感知访问控制策略分析方法,包括对复杂起源图的抽象建模技术以及一个在面向对象的软件开发过程中系统地建立起源模型、规约起源感知访问控制策略的参考过程指南。 最后结合企业在线培训系统案例说明如何应用所提出的方法。

关键词: 起源, 起源模型, 访问控制, UML, 安全工程

Abstract:

Provenance is the historical metadata of data objects. It has recently been used to enable provenancebased access control (PBAC), which grants or denies an access request according to the provenance of either the subjects or the objects. However, provenance can only be collected at runtime via complex directed acyclic graphs, so it is very difficult for security architects to efficiently specify PBAC policies due to the complexity of provenance graphs and its unavailability at design time. We explore a UML modelbased approach to analyze PBAC policies. Specifically, we first introduce a conceptual provenance model to shield the complexity of the provenance graphs and to enable policy analysis at the design time. We then introduce a UML modelbased process to guide the analysis of the conceptual provenance model and the PBAC policies along with the objectoriented development. We validate the proposed approach within an enterprise online training system.

Key words: provenance;provenance model;access control;UML;security engineering