An ontology-based approach to improve access policy administration of attribute-based access control

被引:0
|
作者
Li J. [1 ]
Zhang B. [1 ]
机构
[1] School of Electronic Information and Electric Engineering, Shanghai Key Laboratory of Integrated Administration, Technologies for Information Security, Shanghai Jiao Tong University, Shanghai
基金
中国国家自然科学基金;
关键词
ABAC; access control; attribute-based access control; information security; ontology; OWL; policy administration; security policy; system security; web ontology language;
D O I
10.1504/IJICS.2019.101928
中图分类号
学科分类号
摘要
Attribute-based access control (ABAC) needs a large number of policies to function by using attributes of visitors, resources, environmental conditions, etc. Efficient policy administration is vital for implementation of ABAC models. In this paper, an ontology-based approach is proposed to build up an ABAC model, which is named as an ontology-based ABAC model, OABACM. Underlying relationships among things such as attributes hierarchies in OABACM are identified and described in OABACM, which if treated improperly can directly lead to problems in policy administration. In addition, policy representation and reasoning mechanism are discussed within OABACM and inherent logical properties of this model are formalised in rules. With proper reasoners, these properties can be utilised to logically improve access policy administration by reducing policy redundancy and detecting policy conflicts. In experiments, a sample ontology is created and several enterprise access examples are tested upon OABACM, which validates the effects of our model on policy administration. © 2019 Inderscience Enterprises Ltd.
引用
收藏
页码:391 / 412
页数:21
相关论文
共 50 条
  • [1] ATTRIBUTE-BASED ACCESS CONTROL POLICY GENERATION APPROACH FROM ACCESS LOGS BASED ON THE CATBOOST
    Quan, Shan
    Zhao, Yongdan
    Helil, Nurmamat
    COMPUTING AND INFORMATICS, 2023, 42 (03) : 615 - 650
  • [2] Attribute Expressions, Policy Tables and Attribute-Based Access Control
    Crampton, Jason
    Williams, Conrad
    PROCEEDINGS OF THE 22ND ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'17), 2017, : 79 - 90
  • [3] Policy Extraction and Optimization with Access Logs for Attribute-based Access Control
    Sun, Wei
    Li, Long
    Hu, Ying
    Journal of Network Intelligence, 2023, 8 (03): : 932 - 947
  • [4] Attribute-Based Access Control
    Hu, Vincent C.
    Kuhn, D. Richard
    Ferraiolo, David F.
    COMPUTER, 2015, 48 (02) : 85 - 88
  • [5] On the Feasibility of Attribute-Based Access Control Policy Mining
    Chakraborty, Shuvra
    Sandhu, Ravi
    Krishnan, Ram
    2019 IEEE 20TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION FOR DATA SCIENCE (IRI 2019), 2019, : 245 - 252
  • [6] Attribute-based access control policy specification language
    Ye, Chunxiao
    Zhong, Jiang
    Feng, Yong
    Journal of Southeast University (English Edition), 2008, 24 (03) : 260 - 263
  • [7] Attribute-based lightweight reconfigurable access control policy
    Xie R.
    Li H.
    Shi G.
    Guo Y.
    Tongxin Xuebao/Journal on Communications, 2020, 41 (02): : 112 - 122
  • [8] Attribute-Based Hierarchical Access Control With Extendable Policy
    Xiao, Meiyan
    Li, Hongbo
    Huang, Qiong
    Yu, Shui
    Susilo, Willy
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 1868 - 1883
  • [9] AARBAC: Attribute-Based Administration of Role-Based Access Control
    Ninglekhu, Jiwan L.
    Krishnan, Ram
    2017 IEEE 3RD INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC), 2017, : 126 - 135
  • [10] An Automatic Attribute-Based Access Control Policy Extraction From Access Logs
    Karimi, Leila
    Aldairi, Maryam
    Joshi, James
    Abdelhakim, Mai
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (04) : 2304 - 2317