Combining Mandatory and Attribute-based Access Control

被引:4
|
作者
Kerr, Lawrence [1 ]
Alves-Foss, Jim [1 ]
机构
[1] Univ Idaho, Moscow, ID 83843 USA
基金
美国国家科学基金会;
关键词
D O I
10.1109/HICSS.2016.328
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute based access control (ABAC) offers a great deal of flexibility over more traditional forms of access control in that it relies less on user identity or role but on various attributes of a subject or object. In many instances where a traditional access control approach is taken, such as mandatory access control (MAC) environments, more information beyond a classification is desirable to make a more flexible access control determination. We propose an ABAC model that retains the nature of a strictly MAC approach, while enriching access control decisions with a number of other security attributes by leveraging the concept that classification, clearance, or any other security property of a subject or object is simply an attribute. The model description is followed by an example instance based on current DoD guidelines.
引用
收藏
页码:2616 / 2623
页数:8
相关论文
共 50 条
  • [1] Attribute-Based Access Control
    Hu, Vincent C.
    Kuhn, D. Richard
    Ferraiolo, David F.
    COMPUTER, 2015, 48 (02) : 85 - 88
  • [2] CRYPTOGRAPHIC ACCESS CONTROL FOR MANDATORY SECURITY POLICIES USING ATTRIBUTE-BASED ENCRYPTION
    Plecan, Daniel
    PROCEEDINGS OF THE ROMANIAN ACADEMY SERIES A-MATHEMATICS PHYSICS TECHNICAL SCIENCES INFORMATION SCIENCE, 2017, 18 : 413 - 429
  • [3] Combining IOTA and Attribute-Based Encryption for Access Control in the Internet of Things
    Zhang, Yuanyu
    Nakanishi, Ruka
    Sasabe, Masahiro
    Kasahara, Shoji
    SENSORS, 2021, 21 (15)
  • [4] Using attribute-based access control to enable attribute-based messaging
    Bobba, Rakesh
    Fatemieh, Omid
    Khan, Fariba
    Gunter, Carl A.
    Khurana, Himanshu
    22ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2006, : 403 - +
  • [5] Attribute-Based Oblivious Access Control
    Han, Jinguang
    Susilo, Willy
    Mu, Yi
    Yan, Jun
    COMPUTER JOURNAL, 2012, 55 (10): : 1202 - 1215
  • [6] Mining Attribute-Based Access Control Policies
    Davari, Maryam
    Zulkernine, Mohammad
    INFORMATION SYSTEMS SECURITY, ICISS 2022, 2022, 13784 : 186 - 201
  • [7] Monotonicity and Completeness in Attribute-Based Access Control
    Crampton, Jason
    Morisset, Charles
    SECURITY AND TRUST MANAGEMENT (STM 2014), 2014, 8743 : 33 - 48
  • [8] ABACaaS: Attribute-Based Access Control as a Service
    Meshram, Augustee
    Das, Saptarshi
    Sural, Shamik
    Vaidya, Jaideep
    Atluri, Vijayalakshmi
    PROCEEDINGS OF THE NINTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY '19), 2019, : 153 - 155
  • [9] Mining Attribute-Based Access Control Policies
    Xu, Zhongyuan
    Stoller, Scott D.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2015, 12 (05) : 533 - 545
  • [10] A contextual attribute-based access control model
    Covington, Michael J.
    Sastry, Manoj R.
    On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, Pt 2, Proceedings, 2006, 4278 : 1996 - 2006