Suppr超能文献

Security Analysis of ABAC under an Administrative Model.

作者信息

Jha Sadhana, Sural Shamik, Atluri Vijayalakshmi, Vaidysa Jaideep

机构信息

Advanced Technology Development Center, Indian Institute of Technology, Kharagpur, India.

Department of Computer Science & Engineering, Indian Institute of Technology, Kharagpur, India.

出版信息

IET Inf Secur. 2019 Mar;13(2):96-103. doi: 10.1049/iet-ifs.2018.5010. Epub 2018 Oct 23.

Abstract

In the present day computing environment, where access control decisions are often dependent on contextual information like the location of the requesting user and the time of access request, Attribute Based Access Control (ABAC) has emerged as a suitable choice for expressing security policies. In an ABAC system, access decisions depend on the set of attribute values associated with the subjects, resources and the environment in which an access request is made. In such systems, the task of managing the set of attributes associated with the entities as well as that of analyzing and understanding the security implications of each attribute assignment is of paramount importance. In this paper, we first introduce a comprehensive attribute based administrative model, named as AMABAC (Administrative Model for ABAC), for ABAC systems and then suggest a methodology for analyzing the security properties of ABAC in the presence of the administrative model. For performing analysis, we use Z, a SMT (Satisfiability Modulo Theories) based model checking tool. We study the impact of the various components of ABAC and AMABAC on the time taken for security analysis.

摘要

相似文献

1
Security Analysis of ABAC under an Administrative Model.
IET Inf Secur. 2019 Mar;13(2):96-103. doi: 10.1049/iet-ifs.2018.5010. Epub 2018 Oct 23.
2
PolTree: A Data Structure for Making Efficient Access Decisions in ABAC.
Proc ACM Symp Access Control Model Technol. 2019 Jun;2019:25-35. doi: 10.1145/3322431.3325102.
3
Enabling the Deployment of ABAC Policies in RBAC Systems.
Data Appl Secur Priv XXXII (2018). 2018 Jul;10980:51-68. doi: 10.1007/978-3-319-95729-6_4. Epub 2018 Jul 10.
4
Deploying ABAC policies using RBAC Systems.
J Comput Secur. 2019;27(4):483-506. doi: 10.3233/JCS-191315. Epub 2019 Jul 18.
5
Managing Attribute-Based Access Control Policies in a Unified Framework using Data Warehousing and In-Memory Database.
Comput Secur. 2019 Sep;86:183-205. doi: 10.1016/j.cose.2019.06.001. Epub 2019 Jun 12.
7
Enabling Attribute-based Access Control in NoSQL Databases.
IEEE Trans Emerg Top Comput. 2023 Jan-Mar;11(1):208-223. doi: 10.1109/tetc.2022.3193577. Epub 2022 Jul 29.
8
Contemporaneous Update and Enforcement of ABAC Policies.
Proc ACM Symp Access Control Model Technol. 2022 Jun;2022:31-42. doi: 10.1145/3532105.3535021. Epub 2022 Jun 8.
9
Efficient bottom-up Mining of Attribute Based Access Control Policies.
IEEE Conf Collab Internet Comput. 2017 Oct;2017:339-348. doi: 10.1109/CIC.2017.00051. Epub 2017 Dec 14.
10
Poster: Using Gini Impurity to Mine Attribute-based Access Control Policies with Environment Attributes.
Proc ACM Symp Access Control Model Technol. 2018 Jun;2018:213-215. doi: 10.1145/3205977.3208949.

引用本文的文献

1
A Role-Based Administrative Model for Administration of Heterogeneous Access Control Policies and its Security Analysis.
Inf Syst Front. 2024 Dec;26(6):2255-2272. doi: 10.1007/s10796-021-10167-z. Epub 2021 Jul 21.
2
Blockchain Based Auditable Access Control For Business Processes With Event Driven Policies.
IEEE Trans Dependable Secure Comput. 2024 Sep-Oct;21(5):4699-4716. doi: 10.1109/tdsc.2024.3356811. Epub 2024 Jan 22.
3
Enabling Attribute-Based Access Control in Linux Kernel.
Asia CCS 22 (2022). 2022 May;2022:1237-1239. doi: 10.1145/3488932.3527293. Epub 2022 May 30.

文献AI研究员

20分钟写一篇综述,助力文献阅读效率提升50倍。

立即体验

用中文搜PubMed

大模型驱动的PubMed中文搜索引擎

马上搜索

文档翻译

学术文献翻译模型,支持多种主流文档格式。

立即体验