Ordering policy authorization method and system for extended xacml access control

A sorting strategy and access control technology, applied in transmission systems, electrical components, etc., to achieve the effect of improving search efficiency

Active Publication Date: 2018-09-04
SUN YAT SEN UNIV
View PDF8 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the model uses a local maintenance strategy set and a search management strategy based on the relationship of the authorizer (such as subjectID), and the search efficiency still has room for further expansion.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Ordering policy authorization method and system for extended xacml access control
  • Ordering policy authorization method and system for extended xacml access control
  • Ordering policy authorization method and system for extended xacml access control

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] The implementation of the present invention is described below through specific examples and in conjunction with the accompanying drawings, and those skilled in the art can easily understand other advantages and effects of the present invention from the content disclosed in this specification. The present invention can also be implemented or applied through other different specific examples, and various modifications and changes can be made to the details in this specification based on different viewpoints and applications without departing from the spirit of the present invention.

[0061] figure 1 It is a flow chart of the steps of a sorting policy authorization method for extending xacml access control in the present invention. Such as figure 1 As shown, a sorting policy authorization method for extending xacml access control of the present invention comprises the following steps:

[0062] Step 101, define and generate an access policy. According to the xa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an ordering policy authorization method and system for extended xacml access control. The method comprises the following steps of: S1, defining and generating an access policy;S2, defining and generating a management policy and obtaining a policy library; S3, carrying out ordering on policies in the policy library according to level values from big to small; S4, submittingan access request to a pdp (Policy Determination Point) of an xacml access framework; and S5, searching the ordered policy library, and returning a determination result of a policy with the maximum level value. By the ordering policy authorization method and system disclosed by the invention, search efficiency of the authorized policy can be improved.

Description

technical field [0001] The invention relates to the field of network space security, in particular to a sorting strategy authorization method and system for extending xacml access control. Background technique [0002] In the field of information security, access control management is a method of managing resource access based on user identities, and authorization is a flexible access management mechanism, which means that users can transfer their access rights to specific resources to other entities. Most of the existing authorization mechanisms are based on the role-based access control (RBAC) model, which grants access rights to roles for authorization, and a few models are based on the authorization of the attribute-based access control (ABAC) model. [0003] XACML v3.0 Administration and Delegation Profile Version 1.0, 2014 describes an authorization mechanism based on the xacml standard, which accesses the request by searching the authorization policy <issuer>At...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/10H04L63/104H04L63/20
Inventor 王青范文卓江波
Owner SUN YAT SEN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products