• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

HEAD元模型:用于动态异构结构的分层、可扩展、高级和动态访问控制元模型。

HEAD Metamodel: Hierarchical, Extensible, Advanced, and Dynamic Access Control Metamodel for Dynamic and Heterogeneous Structures.

作者信息

Kashmar Nadine, Adda Mehdi, Ibrahim Hussein

机构信息

Département de Mathématiques, Informatique et Génie, Université du Québec à Rimouski, 300 Allée des Ursulines, Rimouski, QC G5L 3A1, Canada.

Institut Technologique de Maintenance Industrielle, 175 Rue de la Vérendrye, Sept-Îles, QC G4R 5B7, Canada.

出版信息

Sensors (Basel). 2021 Sep 29;21(19):6507. doi: 10.3390/s21196507.

DOI:10.3390/s21196507
PMID:34640825
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC8512299/
Abstract

The substantial advancements in information technologies have brought unprecedented concepts and challenges to provide solutions and integrate advanced and self-ruling systems in critical and heterogeneous structures. The new generation of networking environments (e.g., the Internet of Things (IoT), cloud computing, etc.) are dynamic and ever-evolving environments. They are composed of various private and public networks, where all resources are distributed and accessed from everywhere. Protecting resources by controlling access to them is a complicated task, especially with the presence of cybercriminals and cyberattacks. What makes this reality also challenging is the diversity and the heterogeneity of access control (AC) models, which are implemented and integrated with a countless number of information systems. The evolution of ubiquitous computing, especially the concept of Industry 4.0 and IoT applications, imposes the need to enhance AC methods since the traditional methods are not able to answer the increasing demand for privacy and security standards. To address this issue, we propose a Hierarchical, Extensible, Advanced, and Dynamic (HEAD) AC metamodel for dynamic and heterogeneous structures that is able to encompass the heterogeneity of the existing AC models. Various AC models can be derived, and different static and dynamic AC policies can be generated using its components. We use Eclipse (xtext) to define the grammar of our AC metamodel. We illustrate our approach with several successful instantiations for various models and hybrid models. Additionally, we provide some examples to show how some of the derived models can be implemented to generate AC policies.

摘要

信息技术的重大进步带来了前所未有的概念和挑战,即在关键的异构结构中提供解决方案并集成先进的自治系统。新一代网络环境(如物联网(IoT)、云计算等)是动态且不断发展的环境。它们由各种私有和公共网络组成,所有资源都分布在各处并可从任何地方访问。通过控制对资源的访问来保护资源是一项复杂的任务,尤其是在存在网络犯罪分子和网络攻击的情况下。使这一现实更具挑战性的是访问控制(AC)模型的多样性和异构性,这些模型与无数信息系统一起实施和集成。普适计算的发展,尤其是工业4.0概念和物联网应用,使得增强AC方法成为必要,因为传统方法无法满足对隐私和安全标准日益增长的需求。为了解决这个问题,我们为动态异构结构提出了一种分层、可扩展、先进且动态的(HEAD)AC元模型,该模型能够涵盖现有AC模型的异构性。可以从该元模型导出各种AC模型,并使用其组件生成不同的静态和动态AC策略。我们使用Eclipse(xtext)来定义AC元模型的语法。我们通过针对各种模型和混合模型的几个成功实例来说明我们的方法。此外,我们提供一些示例来说明如何实现一些导出模型以生成AC策略。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/77e8/8512299/a82193b5182f/sensors-21-06507-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/77e8/8512299/4bea5e0750b5/sensors-21-06507-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/77e8/8512299/be9280eab8b9/sensors-21-06507-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/77e8/8512299/9f741e280f51/sensors-21-06507-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/77e8/8512299/528fc8f45537/sensors-21-06507-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/77e8/8512299/bd7d70952a44/sensors-21-06507-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/77e8/8512299/e1b55177eea4/sensors-21-06507-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/77e8/8512299/fcdef92289b6/sensors-21-06507-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/77e8/8512299/6dab02ec74d8/sensors-21-06507-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/77e8/8512299/a82193b5182f/sensors-21-06507-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/77e8/8512299/4bea5e0750b5/sensors-21-06507-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/77e8/8512299/be9280eab8b9/sensors-21-06507-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/77e8/8512299/9f741e280f51/sensors-21-06507-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/77e8/8512299/528fc8f45537/sensors-21-06507-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/77e8/8512299/bd7d70952a44/sensors-21-06507-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/77e8/8512299/e1b55177eea4/sensors-21-06507-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/77e8/8512299/fcdef92289b6/sensors-21-06507-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/77e8/8512299/6dab02ec74d8/sensors-21-06507-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/77e8/8512299/a82193b5182f/sensors-21-06507-g009.jpg

相似文献

1
HEAD Metamodel: Hierarchical, Extensible, Advanced, and Dynamic Access Control Metamodel for Dynamic and Heterogeneous Structures.HEAD元模型:用于动态异构结构的分层、可扩展、高级和动态访问控制元模型。
Sensors (Basel). 2021 Sep 29;21(19):6507. doi: 10.3390/s21196507.
2
A Survey of Context-Aware Access Control Mechanisms for Cloud and Fog Networks: Taxonomy and Open Research Issues.面向云和雾网络的上下文感知访问控制机制研究综述:分类法与开放研究问题
Sensors (Basel). 2020 Apr 27;20(9):2464. doi: 10.3390/s20092464.
3
Device-Based Security to Improve User Privacy in the Internet of Things .基于设备的安全性提高物联网中的用户隐私。
Sensors (Basel). 2018 Aug 14;18(8):2664. doi: 10.3390/s18082664.
4
Verifiable fully outsourced attribute-based signcryption system for IoT eHealth big data in cloud computing.可验证的完全外包基于属性的签密系统,用于云计算中的物联网电子健康大数据。
Math Biosci Eng. 2019 Apr 22;16(5):3561-3594. doi: 10.3934/mbe.2019178.
5
Distributed clinical data sharing via dynamic access-control policy transformation.通过动态访问控制策略转换实现分布式临床数据共享。
Int J Med Inform. 2016 May;89:25-31. doi: 10.1016/j.ijmedinf.2016.02.002. Epub 2016 Feb 12.
6
Semantically Enriched Data Access Policies in eHealth.电子健康领域中语义丰富的数据访问策略
J Med Syst. 2016 Nov;40(11):238. doi: 10.1007/s10916-016-0581-7. Epub 2016 Sep 24.
7
Edge-Computing Architectures for Internet of Things Applications: A Survey.物联网应用的边缘计算架构:一项综述。
Sensors (Basel). 2020 Nov 11;20(22):6441. doi: 10.3390/s20226441.
8
Secure and dynamic access control for the Internet of Things (IoT) based traffic system.基于物联网的交通系统的安全动态访问控制
PeerJ Comput Sci. 2021 May 10;7:e471. doi: 10.7717/peerj-cs.471. eCollection 2021.
9
Security Requirements for the Internet of Things: A Systematic Approach.物联网的安全要求:一种系统方法。
Sensors (Basel). 2020 Oct 19;20(20):5897. doi: 10.3390/s20205897.
10
A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing.一种雾计算-云计算环境下的安全可验证外包访问控制方案
Sensors (Basel). 2017 Jul 24;17(7):1695. doi: 10.3390/s17071695.

引用本文的文献

1
A Novel Unified Data Modeling Method for Equipment Lifecycle Integrated Logistics Support.一种新型的设备全生命周期综合后勤保障统一数据建模方法。
Sensors (Basel). 2022 Jun 3;22(11):4265. doi: 10.3390/s22114265.

本文引用的文献

1
Combining IOTA and Attribute-Based Encryption for Access Control in the Internet of Things.结合IOTA和基于属性的加密用于物联网中的访问控制。
Sensors (Basel). 2021 Jul 26;21(15):5053. doi: 10.3390/s21155053.
2
Advances in Sensor Technologies in the Era of Smart Factory and Industry 4.0.智能工厂和工业 4.0 时代的传感器技术进展。
Sensors (Basel). 2020 Nov 27;20(23):6783. doi: 10.3390/s20236783.
3
Access Control Mechanism for IoT Environments Based on Modelling Communication Procedures as Resources.基于将通信过程建模为资源的物联网环境访问控制机制
Sensors (Basel). 2018 Mar 20;18(3):917. doi: 10.3390/s18030917.