Supporting attribute-based access control with ontologies

被引:43
|
作者
Priebe, Torsten [1 ]
Dobmeier, Wolfgang [2 ]
Kamprath, Nora [2 ]
机构
[1] Capgemini Consulting Osterreich AG, Lassallestr 9b, A-1020 Vienna, Austria
[2] Univ Regensburg, Dept Informat Syst, D-93040 Regensburg, Germany
关键词
D O I
10.1109/ARES.2006.127
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In highly open systems like the Internet, attribute-based access control (ABAC) has proven its appropriateness. The specification and maintenance of ABAC policies however has turned out to be complex and error-prone, especially if heterogeneous attribute schemes are involved Here, the arising Semantic Web can contribute to a solution. This paper presents an approach based on an extension of the established XACML standard. It simplifies the policies by providing an ontology-based attribute management facility.
引用
收藏
页码:465 / +
页数:3
相关论文
共 50 条
  • [1] Towards Integrating Attribute-Based Access Control into Ontologies
    Dundua, Besik
    Rukhaia, Mikheil
    [J]. 2019 IEEE 2ND UKRAINE CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (UKRCON-2019), 2019, : 1052 - 1056
  • [2] Efficiently Supporting Attribute-Based Access Control in Linux
    Varshith, H. O. Sai
    Sural, Shamik
    Vaidya, Jaideep
    Atluri, Vijayalakshmi
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 2012 - 2026
  • [3] Efficiently Supporting Attribute-Based Access Control in Relational Databases
    Meena, Gaurav
    Paul, Proteet
    Sural, Shamik
    [J]. 2023 5TH IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS, TPS-ISA, 2023, : 230 - 239
  • [4] Attribute-Based Access Control
    Hu, Vincent C.
    Kuhn, D. Richard
    Ferraiolo, David F.
    [J]. COMPUTER, 2015, 48 (02) : 85 - 88
  • [5] Towards Supporting Attribute-Based Access Control in Hyperledger Fabric Blockchain
    Pericherla, Amshumaan
    Paul, Proteet
    Sural, Shamik
    Vaidya, Jaideep
    Atluri, Vijay
    [J]. ICT SYSTEMS SECURITY AND PRIVACY PROTECTION (SEC 2022), 2022, 648 : 360 - 376
  • [6] Using attribute-based access control to enable attribute-based messaging
    Bobba, Rakesh
    Fatemieh, Omid
    Khan, Fariba
    Gunter, Carl A.
    Khurana, Himanshu
    [J]. 22ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2006, : 403 - +
  • [7] ABSAC: Attribute-Based Access Control Model Supporting Anonymous Access for Smart Cities
    Zhang, Runnan
    Liu, Gang
    Li, Shancang
    Wei, Yongheng
    Wang, Quan
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [8] Attribute-Based Oblivious Access Control
    Han, Jinguang
    Susilo, Willy
    Mu, Yi
    Yan, Jun
    [J]. COMPUTER JOURNAL, 2012, 55 (10): : 1202 - 1215
  • [9] Mining Attribute-Based Access Control Policies
    Davari, Maryam
    Zulkernine, Mohammad
    [J]. INFORMATION SYSTEMS SECURITY, ICISS 2022, 2022, 13784 : 186 - 201
  • [10] Monotonicity and Completeness in Attribute-Based Access Control
    Crampton, Jason
    Morisset, Charles
    [J]. SECURITY AND TRUST MANAGEMENT (STM 2014), 2014, 8743 : 33 - 48