Page 327 - 《软件学报》2025年第9期
P. 327

4238                                                       软件学报  2025  年第  36  卷第  9  期


                 体的设计思路和方法. 同时, 为了保证提出的算法能够适应未来大型网络环境下的性能需求, 我们提出了一个强安
                 全高性能的    CBAC  访问控制引擎算法      Super-Dumbo, 实现了共识算法的性能优化, 提高了吞吐量和降低延迟, 满足
                 低延迟和高吞吐量的性能需求. 原型验证实验表明, 与小飞象相比在平均时延上, Dumbo2.5                        有  22.59%–27.85%  的
                 下降; 在吞吐量的上, Opti-MVBA      优化有   15.28%–33.23%  的增加, 循环等待断言优化有        1.47%–8.30%  的增加,
                 Dumbo2.5  有  29.18%–38.59%  的增加, 综合来看性能均优于原有小飞象协议.


                 References:
                  [1]   Bertino E, Bettini C, Ferrari E, Samarati P. A temporal access control mechanism for database systems. IEEE Trans. on Knowledge and
                     Data Engineering, 1996, 8(1): 67–80. [doi: 10.1109/69.485637]
                  [2]   Ryutov T, Neuman C, Kim DH, Zhou L. Integrated access control and intrusion detection for Web servers. IEEE Trans. on Parallel and
                     Distributed Systems, 2003, 14(9): 841–850. [doi: 10.1109/TPDS.2003.1233707]
                  [3]   Centonze  P.  Security  and  privacy  frameworks  for  access  control  big  data  systems.  Computers,  Materials  &  Continua,  2019,  59(2):
                     361–374. [doi: 10.32604/cmc.2019.06223]
                  [4]   Xue KP, Gai N, Hong JN, Wei DSL, Hong PL, Yu NH. Efficient and secure attribute-based access control with identical sub-policies
                     frequently used in cloud storage. IEEE Trans. on Dependable and Secure Computing, 2022, 19(1): 635–646. [doi: 10.1109/TDSC.2020.
                     2987903]
                  [5]   Han DZ, Zhu YJ, Li D, Liang W, Souri A, Li KC. A blockchain-based auditable access control system for private data in service-centric
                     IoT environments. IEEE Trans. on Industrial Informatics, 2022, 18(5): 3530–3540. [doi: 10.1109/TII.2021.3114621]
                  [6]   Ameer S, Benson J, Sandhu R. An attribute-based approach toward a secured smart-home IoT access control and a comparison with a role-
                     based approach. Information, 2022, 13(2): 60. [doi: 10.3390/info13020060]
                  [7]   Sandhu RS, Coyne EJ, Feinstein HL, Youman CE. Role-based access control models. Computer, 1996, 29(2): 38–47. [doi: 10.1109/2.
                     485845]
                  [8]   Goyal V, Pandey O, Sahai A, Waters B. Attribute-based encryption for fine-grained access control of encrypted data. In: Proc. of the 13th
                     ACM Conf. on Computer and Communications Security. Alexandria: Association for Computing Machinery, 2006. 89–98. [doi: 10.1145/
                     1180405.1180418]
                  [9]   Yu SC, Wang C, Ren K, Lou WJ. Achieving secure, scalable, and fine-grained data access control in cloud computing. In: Proc. of the
                     2010 IEEE INFOCOM. San Diego: IEEE, 2010. 1–9. [doi: 10.1109/INFCOM.2010.5462174]
                 [10]   Hebig RN, Meinel C, Menzel M, Thomas I, Warschofsky R. A Web service architecture for decentralised identity- and attribute-based
                     access control. In: Proc. of the 2009 IEEE Int’l Conf. on Web Services. Los Angeles: IEEE, 2009. 551–558. [doi: 10.1109/ICWS.2009.
                     89]
                 [11]   Xinhuanet.com.  Facebook’s  50  million  user  information  leaked.  2018  (in  Chinese).  http://www.xinhuanet.com/world/2018-03/24/
                     c_129836684.htm
                 [12]   CISOMAG. Instagram data breach! 49 million users’ sensitive data exposed online. 2019. https://cisomag.com/instagram-data-breach-49-
                     million-users-sensitive-data-exposed-online/#:~:text=May%2023%2C%202019%20Another%20data%20leak%20in%20Facebook
                     %E2%80%99s, accounts%20have%20been%20found%20online%2C%20the%20TechCrunch%20reported
                 [13]   ZDNET. Companies are leaking sensitive files via Box accounts. 2019. https://www.zdnet.com/article/companies-are-leaking-sensitive-
                     files-via-box-accounts/
                 [14]   CCTV. Northwestern Polytechnical University was attacked by the US NSA cyber attack: The US has gradually infiltrated and stolen
                     secrets for a long time. 2022 (in Chinese). https://news.cctv.com/2022/09/27/ARTI1YjUCAzciKAsNQsy1Rxd220927.shtml
                 [15]   National Computer Security Center. A guide to understanding discretionary access control in trusted systems. In: The ‘Orange Book’
                     Series. London: Springer, 1987. [doi: 10.1007/978-1-349-12020-8_8]
                 [16]   Upadhyaya S. Mandatory access control. In: van Tilborg HCA, Jajodia S, eds. Encyclopedia of Cryptography and Security. 2nd ed., New
                     York: Springer, 2011. 756–758. [doi: 10.1007/978-1-4419-5906-5_784]
                 [17]   Maulina A, Rasjid ZE. Unified access management for digital evidence storage: Integrating attribute-based and role-based access control
                     with XACML. Int’l Journal of Advanced Computer Science and Applications, 2024, 15(3): 1345–1353. [doi: 10.14569/IJACSA.2024.
                     01503131]
                 [18]   Kalam AAE, Baida RE, Balbiani P, Benferhat S, Cuppens F, Deswarte Y, Miege A, Saurel C, Trouessin G. Organization based access
                     control. In: Proc. of the 4th Int’l Workshop on Policies for Distributed Systems and Networks. Lake Como: IEEE, 2003. 120–131. [doi:
                     10.1109/POLICY.2003.1206966]
   322   323   324   325   326   327   328   329   330   331   332