Two-level policy decision-based access control method and system

A policy decision-making and access control technology, applied in the field of access control in information security, can solve problems such as the impact of SAAM versatility, and achieve the effect of ensuring versatility

Active Publication Date: 2013-04-10
INST OF SOFTWARE - CHINESE ACAD OF SCI
View PDF6 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the SAAM model, PEP does not base its decision-making on access control policies, so the decision-making logic is different from that of PDP. This results in different decision-making logics for SAAM at the PEP side for different access control models, which is harmful to SAAM. The versatility of the

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Two-level policy decision-based access control method and system
  • Two-level policy decision-based access control method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] Below by example the present invention is described in more detail.

[0053] Such as figure 2 As shown, it is assumed that the PEP and local PDP in the access control system are deployed on the resource server (that is, at first a PEP and local PDP will be deployed on each resource server, and the local PDP deployed together with the PEP is the first level), The central PDP is deployed on the policy decision server (that is, the central PDP is the second level), the resource server is physically separated from the policy decision server, and the resource server has a certain computing power; the resource server is physically separated from the policy decision server Yes, over a network connection. When the user is authenticated and initiates an access request to the protected resources stored on the resource server, the execution flow of the access control system based on two-level policy decisions is as follows:

[0054] 1. After the PEP intercepts the user's access...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a two-level policy decision-based access control method and a two-level policy decision-based access control system, and belongs to the field of access control in information safety. In the method, a local policy decision point (PDP) is deployed at a policy enforcement point (PEP) end, and the local PDP makes a decision for an access request according to a local policy cache, and if the local PDP cannot determine that the decision is a deterministic decision, a central PDP finally finishes the decision according to a system policy library. The system comprises a policydecision server, an attribute publishing point and a plurality of resource servers, wherein a policy enforcement point (PEP) and a local policy decision point (PDP) are deployed on each resource server; and a central policy decision point (PDP) is deployed on the policy decision server. The invention has a good dynamically adjusted elastic system framework, fully utilizes the computing resources of the PEP end, lightens the burden of the central PDP, reduces the network transmission overhead and effectively improves the access control efficiency at extremely low policy update cost.

Description

technical field [0001] The invention belongs to the field of access control in information security, and in particular relates to an access control method and system based on two-level policy decision-making. Background technique [0002] As a security facility to protect resources from illegal access, the access control system's efficiency directly affects the efficiency of the entire system. Most current access control systems adopt the access control architecture in ISO / IEC 10181-3, that is, the policy enforcement point (Policy Enforcement Point, PEP) intercepts the access request initiated by the user, and then submits the access request to the policy decision point ( Policy Decision Point (PDP) makes a decision, and finally the PEP executes the decision of the PDP. In practical applications, the PEP and the PDP are usually physically separated, so the communication channel between the PEP and the PDP needs to be protected. In the case that the PEP has a certain comput...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 冯登国张立武王鹏翩
Owner INST OF SOFTWARE - CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products