• 中国计算机学会会刊
  • 中国科技核心期刊
  • 中文核心期刊

J4 ›› 2015, Vol. 37 ›› Issue (10): 1831-1835.

• 论文 • Previous Articles     Next Articles

Peripheral access control based on user identity  

CHEN Songzheng,WEI Lifeng   

  1. (College of Computer,National University of Defense Technology,Changsha 410073,China)
  • Received:2015-02-20 Revised:2015-05-25 Online:2015-10-25 Published:2015-10-25

Abstract:

With respect to the coarse granularity and simplicity of the existing equipment control methods, we propose a peripheral access control method based on user identification, which can achieve a flexible and fine-grained access control for peripherals by using peripheral role access control lists, user group peripheral access control lists and user peripheral access control lists. Based on Linux operating system, we design and implement a framework, in which we utilize a peripheral feature database to identify a variety of devices; a policy database to define access permissions in connection with roles, user groups and users; and an arbitration procedure to check the accesses of peripherals. Finally, the functions are tested to verify the validity of the method and the features of the method are analyzed.

Key words: peripheral;access control list;role based access control;security policy