Page 327 - 《软件学报》2025年第9期
P. 327
4238 软件学报 2025 年第 36 卷第 9 期
体的设计思路和方法. 同时, 为了保证提出的算法能够适应未来大型网络环境下的性能需求, 我们提出了一个强安
全高性能的 CBAC 访问控制引擎算法 Super-Dumbo, 实现了共识算法的性能优化, 提高了吞吐量和降低延迟, 满足
低延迟和高吞吐量的性能需求. 原型验证实验表明, 与小飞象相比在平均时延上, Dumbo2.5 有 22.59%–27.85% 的
下降; 在吞吐量的上, Opti-MVBA 优化有 15.28%–33.23% 的增加, 循环等待断言优化有 1.47%–8.30% 的增加,
Dumbo2.5 有 29.18%–38.59% 的增加, 综合来看性能均优于原有小飞象协议.
References:
[1] Bertino E, Bettini C, Ferrari E, Samarati P. A temporal access control mechanism for database systems. IEEE Trans. on Knowledge and
Data Engineering, 1996, 8(1): 67–80. [doi: 10.1109/69.485637]
[2] Ryutov T, Neuman C, Kim DH, Zhou L. Integrated access control and intrusion detection for Web servers. IEEE Trans. on Parallel and
Distributed Systems, 2003, 14(9): 841–850. [doi: 10.1109/TPDS.2003.1233707]
[3] Centonze P. Security and privacy frameworks for access control big data systems. Computers, Materials & Continua, 2019, 59(2):
361–374. [doi: 10.32604/cmc.2019.06223]
[4] Xue KP, Gai N, Hong JN, Wei DSL, Hong PL, Yu NH. Efficient and secure attribute-based access control with identical sub-policies
frequently used in cloud storage. IEEE Trans. on Dependable and Secure Computing, 2022, 19(1): 635–646. [doi: 10.1109/TDSC.2020.
2987903]
[5] Han DZ, Zhu YJ, Li D, Liang W, Souri A, Li KC. A blockchain-based auditable access control system for private data in service-centric
IoT environments. IEEE Trans. on Industrial Informatics, 2022, 18(5): 3530–3540. [doi: 10.1109/TII.2021.3114621]
[6] Ameer S, Benson J, Sandhu R. An attribute-based approach toward a secured smart-home IoT access control and a comparison with a role-
based approach. Information, 2022, 13(2): 60. [doi: 10.3390/info13020060]
[7] Sandhu RS, Coyne EJ, Feinstein HL, Youman CE. Role-based access control models. Computer, 1996, 29(2): 38–47. [doi: 10.1109/2.
485845]
[8] Goyal V, Pandey O, Sahai A, Waters B. Attribute-based encryption for fine-grained access control of encrypted data. In: Proc. of the 13th
ACM Conf. on Computer and Communications Security. Alexandria: Association for Computing Machinery, 2006. 89–98. [doi: 10.1145/
1180405.1180418]
[9] Yu SC, Wang C, Ren K, Lou WJ. Achieving secure, scalable, and fine-grained data access control in cloud computing. In: Proc. of the
2010 IEEE INFOCOM. San Diego: IEEE, 2010. 1–9. [doi: 10.1109/INFCOM.2010.5462174]
[10] Hebig RN, Meinel C, Menzel M, Thomas I, Warschofsky R. A Web service architecture for decentralised identity- and attribute-based
access control. In: Proc. of the 2009 IEEE Int’l Conf. on Web Services. Los Angeles: IEEE, 2009. 551–558. [doi: 10.1109/ICWS.2009.
89]
[11] Xinhuanet.com. Facebook’s 50 million user information leaked. 2018 (in Chinese). http://www.xinhuanet.com/world/2018-03/24/
c_129836684.htm
[12] CISOMAG. Instagram data breach! 49 million users’ sensitive data exposed online. 2019. https://cisomag.com/instagram-data-breach-49-
million-users-sensitive-data-exposed-online/#:~:text=May%2023%2C%202019%20Another%20data%20leak%20in%20Facebook
%E2%80%99s, accounts%20have%20been%20found%20online%2C%20the%20TechCrunch%20reported
[13] ZDNET. Companies are leaking sensitive files via Box accounts. 2019. https://www.zdnet.com/article/companies-are-leaking-sensitive-
files-via-box-accounts/
[14] CCTV. Northwestern Polytechnical University was attacked by the US NSA cyber attack: The US has gradually infiltrated and stolen
secrets for a long time. 2022 (in Chinese). https://news.cctv.com/2022/09/27/ARTI1YjUCAzciKAsNQsy1Rxd220927.shtml
[15] National Computer Security Center. A guide to understanding discretionary access control in trusted systems. In: The ‘Orange Book’
Series. London: Springer, 1987. [doi: 10.1007/978-1-349-12020-8_8]
[16] Upadhyaya S. Mandatory access control. In: van Tilborg HCA, Jajodia S, eds. Encyclopedia of Cryptography and Security. 2nd ed., New
York: Springer, 2011. 756–758. [doi: 10.1007/978-1-4419-5906-5_784]
[17] Maulina A, Rasjid ZE. Unified access management for digital evidence storage: Integrating attribute-based and role-based access control
with XACML. Int’l Journal of Advanced Computer Science and Applications, 2024, 15(3): 1345–1353. [doi: 10.14569/IJACSA.2024.
01503131]
[18] Kalam AAE, Baida RE, Balbiani P, Benferhat S, Cuppens F, Deswarte Y, Miege A, Saurel C, Trouessin G. Organization based access
control. In: Proc. of the 4th Int’l Workshop on Policies for Distributed Systems and Networks. Lake Como: IEEE, 2003. 120–131. [doi:
10.1109/POLICY.2003.1206966]

