Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Attribute-Based Access Control

Published: 01 February 2015 Publication History

Abstract

Attribute-based access control (ABAC) is a flexible approach that can implement AC policies limited only by the computational language and the richness of the available attributes, making it ideal for many distributed or rapidly changing environments.

References

[1]
V.C. Hu et al., Guide to Attribute Based Access Control (ABAC) Definition and Considerations, NIST Special Publication 800-162, Nat’l Institute of Standards and Technology, Jan. 2014; http://nvlpubs.nist.gov/nistpubs/specialpublications/NIST.sp.800-162.pdf.
[2]
V.C. Hu, D.F. Ferraiolo, and D.R. Kuhn, Assessment of Access Control Systems, NIST Interagency Report 7316, Nat’l Institute of Standards and Technology, Mar. 2006; http://csrc.nist.gov/publications/nistir/7316/NISTIR-7316.pdf.
[3]
Avatier Corp., “Leveraging Today's Megatrends to Drive the Future of Identity Management,” video presentation, Gartner Identity and Access Management (IAM) Summit, 2012; www.avatier.com/products/identity-management/resources/gartner-iam-2020-predictions.
[4]
D.R. Kuhn, E.J. Coyne, and T.R. Weil, “Adding Attributes to Role Based Access Control,” Computer, vol. 43, no. 6,2010, pp. 79–81.

Cited By

View all
  • (2024)How We Built Cedar: A Verification-Guided ApproachCompanion Proceedings of the 32nd ACM International Conference on the Foundations of Software Engineering10.1145/3663529.3663854(351-357)Online publication date: 10-Jul-2024
  • (2024)Cedar: A New Language for Expressive, Fast, Safe, and Analyzable AuthorizationProceedings of the ACM on Programming Languages10.1145/36498358:OOPSLA1(670-697)Online publication date: 29-Apr-2024
  • (2024)GAZETA: GAme-Theoretic ZEro-Trust Authentication for Defense Against Lateral Movement in 5G IoT NetworksIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.332697519(540-554)Online publication date: 1-Jan-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Computer
Computer  Volume 48, Issue 2
Feb. 2015
82 pages

Publisher

IEEE Computer Society Press

Washington, DC, United States

Publication History

Published: 01 February 2015

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 12 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2024)How We Built Cedar: A Verification-Guided ApproachCompanion Proceedings of the 32nd ACM International Conference on the Foundations of Software Engineering10.1145/3663529.3663854(351-357)Online publication date: 10-Jul-2024
  • (2024)Cedar: A New Language for Expressive, Fast, Safe, and Analyzable AuthorizationProceedings of the ACM on Programming Languages10.1145/36498358:OOPSLA1(670-697)Online publication date: 29-Apr-2024
  • (2024)GAZETA: GAme-Theoretic ZEro-Trust Authentication for Defense Against Lateral Movement in 5G IoT NetworksIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.332697519(540-554)Online publication date: 1-Jan-2024
  • (2024)Using private set intersection to achieve privacy-preserving authorization for IoT systemsJournal of Information Security and Applications10.1016/j.jisa.2024.10375983:COnline publication date: 1-Jun-2024
  • (2024)Smart contracts attribute-based access control model for security & privacy of IoT system using blockchain and edge computingThe Journal of Supercomputing10.1007/s11227-023-05517-480:2(1396-1425)Online publication date: 1-Jan-2024
  • (2024)StuChain: an efficient blockchain-based student e-portfolio platform integrating hybrid access control approachMultimedia Tools and Applications10.1007/s11042-023-15560-183:1(227-251)Online publication date: 1-Jan-2024
  • (2024)Distributed AgriFood Supply ChainsJournal of Network and Systems Management10.1007/s10922-024-09839-332:3Online publication date: 1-Jul-2024
  • (2023)MultiviewProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620657(7499-7516)Online publication date: 9-Aug-2023
  • (2023)FACSCSecurity and Communication Networks10.1155/2023/60132702023Online publication date: 1-Jan-2023
  • (2023)Structured Literature Review on Access Controls Mechanism in Block Chain Consensus Algorithm: State of Art and Future DirectionProceedings of the 5th International Conference on Information Management & Machine Intelligence10.1145/3647444.3647941(1-8)Online publication date: 23-Nov-2023
  • Show More Cited By

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media