Incorporating Off-Line Attribute Delegation into Hierarchical Group and Attribute-Based Access Control

被引:0
|
作者
Servos, Daniel [1 ]
Bauer, Michael [1 ]
机构
[1] Western Univ, Dept Comp Sci, London, ON, Canada
关键词
Delegation; Attribute-Based Access Control; ABAC; HGABAC;
D O I
10.1007/978-3-030-45371-8_15
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Efforts towards incorporating user-to-user delegation into Attribute-Based Access Control (ABAC) is an emerging new direction in ABAC research. A number of potential strategies for integrating delegation have been proposed in recent literature but few have been realized as full ABAC delegation models. This work formalizes one such strategy, entitled User-To-User Attribute Delegation, into a working delegation model by extending the Hierarchical Group and Attribute-Based Access Control (HGABAC) model to support dynamic and "off-line" attribute delegation. A framework to support the proposed delegation model is also presented and gives implementation details including an updated Attribute Certificate format and service protocol based on the Hierarchical Group Attribute Architecture (HGAA).
引用
收藏
页码:242 / 260
页数:19
相关论文
共 50 条
  • [1] Strategies for Incorporating Delegation into Attribute-Based Access Control (ABAC)
    Servos, Daniel
    Osborn, Sylvia L.
    [J]. FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2016, 2017, 10128 : 320 - 328
  • [2] HGAA: An Architecture to Support Hierarchical Group and Attribute-Based Access Control
    Servos, Daniel
    Osborn, Sylvia L.
    [J]. PROCEEDINGS OF THE THIRD ACM WORKSHOP ON ATTRIBUTE-BASED ACCESS CONTROL (ABAC'18), 2018, : 1 - 12
  • [3] An extended Attribute-based access control with controlled delegation in IoT
    Tegane, Saher
    Semchedine, Fouzi
    Boudries, Abdelmalek
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 76
  • [4] Levelled attribute-based encryption for hierarchical access control
    Le, Huy Quoc
    Le, Phi Thuong
    Trinh, Sy Tuan
    Susilo, Willy
    Trinh, Viet Cuong
    [J]. Computer Standards and Interfaces, 2025, 93
  • [5] Attribute-Based Hierarchical Access Control With Extendable Policy
    Xiao, Meiyan
    Li, Hongbo
    Huang, Qiong
    Yu, Shui
    Susilo, Willy
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 1868 - 1883
  • [6] Attribute-Based Access Control
    Hu, Vincent C.
    Kuhn, D. Richard
    Ferraiolo, David F.
    [J]. COMPUTER, 2015, 48 (02) : 85 - 88
  • [7] Using attribute-based access control to enable attribute-based messaging
    Bobba, Rakesh
    Fatemieh, Omid
    Khan, Fariba
    Gunter, Carl A.
    Khurana, Himanshu
    [J]. 22ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2006, : 403 - +
  • [8] Policy Adaptation in Hierarchical Attribute-based Access Control Systems
    Das, Saptarshi
    Sural, Shamik
    Vaidya, Jaideep
    Atluri, Vijayalakshmi
    [J]. ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2019, 19 (03)
  • [9] Immediate attribute revocation in decentralized attribute-based access control
    Imine, Youcef
    Lounis, Ahmed
    Bouabdallah, Abdelmadjid
    [J]. 2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 33 - 40
  • [10] Attribute Expressions, Policy Tables and Attribute-Based Access Control
    Crampton, Jason
    Williams, Conrad
    [J]. PROCEEDINGS OF THE 22ND ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'17), 2017, : 79 - 90