Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2613087.2613109acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
research-article

Attribute based access control for APIs in spring security

Published: 25 June 2014 Publication History

Abstract

The widespread adoption of Application Programming Interfaces (APIs) by enterprises is changing the way business is done by permitting the implementation of a multitude of apps, customized to user needs. While supporting a more flexible exploitation of available data, services and applications developed on top of APIs are vulnerable to a variety of attacks, ranging from SQL injection to unauthorized access of sensitive data. Available security solutions must be re-used and/or adapted to work with APIs. In this paper, we focus on the development of a flexible access control mechanism for APIs. This is an important security mechanism to guarantee the enforcement of authorization constraints on resources while invoking their API functions. We have developed an extension of the Spring Security framework, the standard for securing services and apps built in the popular (open source) Spring framework, for the specification and enforcement of Attribute-Based Access Control (ABAC) policies. We demonstrate our work with scenarios arising in a smart energy eco-system.

References

[1]
A. Armando, R. Carbone, E. G. Chekole, C. Petrazzuolo, A. Ranalli, and S. Ranise. Selective Release of Smart Metering Data in Multi-domain Smart Grids. In 2nd Open EIT ICT Labs Workshop on Smart Grid Security, 2014.
[2]
X. Jin, R. Krishnan, and R. Sandhu. A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC. In DBSec, number 7371 in LNCS, pages 41--55, 2012.
[3]
G. Naumovich and P. Centonze. Static Analysis of Role-based Access Control in J2EE Applications. SIGSOFT Softw. Eng. Notes, 29(5):1--10, Sept. 2004.
[4]
E. Yuan and J. Tong. Attributed Based Access Control (ABAC) for Web Services. In IEEE Int. Conf. on Web Services, ICWS '05, pages 561--569. IEEE Computer Society, 2005.

Cited By

View all
  • (2024)Efficiently Supporting Attribute-Based Access Control in LinuxIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.329942921:4(2012-2026)Online publication date: Jul-2024
  • (2022)A Framework to Verify the ABAC Policies in Web ApplicationsIntelligence of Things: Technologies and Applications10.1007/978-3-031-15063-0_11(124-133)Online publication date: 23-Aug-2022
  • (2020)Coding Practices and Recommendations of Spring Security for Enterprise Applications2020 IEEE Secure Development (SecDev)10.1109/SecDev45635.2020.00024(49-57)Online publication date: Sep-2020
  • Show More Cited By

Index Terms

  1. Attribute based access control for APIs in spring security

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      SACMAT '14: Proceedings of the 19th ACM symposium on Access control models and technologies
      June 2014
      234 pages
      ISBN:9781450329392
      DOI:10.1145/2613087
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 25 June 2014

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. attribute-based access control
      2. energy@home
      3. spring security

      Qualifiers

      • Research-article

      Conference

      SACMAT '14
      Sponsor:

      Acceptance Rates

      SACMAT '14 Paper Acceptance Rate 17 of 58 submissions, 29%;
      Overall Acceptance Rate 177 of 597 submissions, 30%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)16
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 30 Aug 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Efficiently Supporting Attribute-Based Access Control in LinuxIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.329942921:4(2012-2026)Online publication date: Jul-2024
      • (2022)A Framework to Verify the ABAC Policies in Web ApplicationsIntelligence of Things: Technologies and Applications10.1007/978-3-031-15063-0_11(124-133)Online publication date: 23-Aug-2022
      • (2020)Coding Practices and Recommendations of Spring Security for Enterprise Applications2020 IEEE Secure Development (SecDev)10.1109/SecDev45635.2020.00024(49-57)Online publication date: Sep-2020
      • (2019)ICS-SEAProceedings of the Fifth Annual Industrial Control System Security (ICSS) Workshop10.1145/3372318.3372325(60-69)Online publication date: 10-Dec-2019
      • (2019)An approach to analyze software security requirements in ABAC model2019 6th NAFOSTED Conference on Information and Computer Science (NICS)10.1109/NICS48868.2019.9023902(184-189)Online publication date: Dec-2019
      • (2017)A Fine-Grained Access Control Model and ImplementationProceedings of the 18th International Conference on Computer Systems and Technologies10.1145/3134302.3134310(187-194)Online publication date: 23-Jun-2017

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media