Role-Based Access Control Models
Computer
Proposed NIST standard for role-based access control
ACM Transactions on Information and System Security (TISSEC)
Toward open, secure, widely distributed services
Communications of the ACM - Adaptive middleware
A logic-based framework for attribute based access control
Proceedings of the 2004 ACM workshop on Formal methods in security engineering
Attributed Based Access Control (ABAC) for Web Services
ICWS '05 Proceedings of the IEEE International Conference on Web Services
Behavior-Based Network Access Control: A Proof-of-Concept
ISC '08 Proceedings of the 11th international conference on Information Security
Behavior-Based Access Control for Distributed Healthcare Environment
CBMS '08 Proceedings of the 2008 21st IEEE International Symposium on Computer-Based Medical Systems
Network virtualization architecture: proposal and initial prototype
Proceedings of the 1st ACM workshop on Virtualized infrastructure systems and architectures
Network virtualization: a view from the bottom
Proceedings of the 1st ACM workshop on Virtualized infrastructure systems and architectures
Network virtualization: state of the art and research challenges
IEEE Communications Magazine
A survey of network virtualization
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.00 |
With the application of network virtualization technique, a collection of autonomous and heterogeneous virtual networks (VNs) could co-exist on an underlying shared physical substrate. In such an environment, end users and network resources are distributed across different VNs in a dynamic fashion. From the service provider's perspective, efficient access control mechanism needs to be deployed to VNs to guarantee global resource utilization efficiency whilst meet certain operational requirements, e.g. security, service level agreements (SLAs). As a response, this paper presents a scalable and flexible network access control framework within individual or across multiple VN domains: BABAC (Behaviors and Attributes Based Access Control). It is based on user behaviors and attributes where the access decisions are made through two phases: the preaccess control based on three categorized user attributes and the post-access control maintaining the knowledge of network resources utilizations based on three categories of user behaviors. This paper highlights the strength of the proposed approach to be applied in network virtualization environment (NVE) which exhibits a collection of unique characteristics, e.g. VN autonomy, user mobility and multi-homing. Through a comprehensive comparison with the state-of-the-art approaches, the evaluation outcome demonstrates its effectiveness for access control in NVE.