Automated Generation and Update of Structured ABAC Policies
Abstract
References
Index Terms
- Automated Generation and Update of Structured ABAC Policies
Recommendations
Specification and Analysis of ABAC Policies via the Category-based Metamodel
CODASPY '19: Proceedings of the Ninth ACM Conference on Data and Application Security and PrivacyThe Attribute-Based Access Control (ABAC) model is one of the most powerful access control models in use. It subsumes popular models, such as the Role-Based Access Control (RBAC) model, and can also enforce dynamic policies where authorisations depend ...
Graph-Based Specification of Admin-CBAC Policies
CODASPY '21: Proceedings of the Eleventh ACM Conference on Data and Application Security and PrivacyWe present a graph-based language for the specification of administrative access control policies in Admin-CBAC, an administrative model for Category-Based Access Control. More precisely, we propose a multi-level graph representation of policies and a ...
Admin-CBAC: An Administration Model for Category-Based Access Control
CODASPY '20: Proceedings of the Tenth ACM Conference on Data and Application Security and PrivacyWe present Admin-CBAC, an administrative model for Category- Based Access Control (CBAC). Since most of the access control models in use nowadays are instances of CBAC, in particular the popular RBAC and ABAC models, from Admin-CBAC we derive ...
Comments
Information & Contributors
Information
Published In
![cover image ACM Conferences](/cms/asset/996918fc-08b8-428e-a2c7-3124b8bb6e52/3643650.cover.jpg)
- Program Chairs:
- Maanak Gupta,
- Mahmoud Abdelsalam,
- Mir Pritom,
- Feras Awaysheh
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 16Total Downloads
- Downloads (Last 12 months)16
- Downloads (Last 6 weeks)16
Other Metrics
Citations
View Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in