Attribute-Based Access Control

被引:291
|
作者
Hu, Vincent C. [1 ]
Kuhn, D. Richard [1 ]
Ferraiolo, David F. [2 ]
机构
[1] NIST, Comp Secur Div, Gaithersburg, MD 20899 USA
[2] NIST, Secure Syst & Applicat Grp, Comp Secur Div, Gaithersburg, MD 20899 USA
关键词
ABAC; access control; attribute-based access control; NIST; security;
D O I
10.1109/MC.2015.33
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-based access control (ABAC) is a flexible approach that can implement AC policies limited only by the computational language and the richness of the available attributes, making it ideal for many distributed or rapidly changing environments. © 1970-2012 IEEE.
引用
收藏
页码:85 / 88
页数:4
相关论文
共 50 条
  • [1] Using attribute-based access control to enable attribute-based messaging
    Bobba, Rakesh
    Fatemieh, Omid
    Khan, Fariba
    Gunter, Carl A.
    Khurana, Himanshu
    [J]. 22ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2006, : 403 - +
  • [2] Attribute-Based Oblivious Access Control
    Han, Jinguang
    Susilo, Willy
    Mu, Yi
    Yan, Jun
    [J]. COMPUTER JOURNAL, 2012, 55 (10): : 1202 - 1215
  • [3] Mining Attribute-Based Access Control Policies
    Davari, Maryam
    Zulkernine, Mohammad
    [J]. INFORMATION SYSTEMS SECURITY, ICISS 2022, 2022, 13784 : 186 - 201
  • [4] Monotonicity and Completeness in Attribute-Based Access Control
    Crampton, Jason
    Morisset, Charles
    [J]. SECURITY AND TRUST MANAGEMENT (STM 2014), 2014, 8743 : 33 - 48
  • [5] Mining Attribute-Based Access Control Policies
    Xu, Zhongyuan
    Stoller, Scott D.
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2015, 12 (05) : 533 - 545
  • [6] ABACaaS: Attribute-Based Access Control as a Service
    Meshram, Augustee
    Das, Saptarshi
    Sural, Shamik
    Vaidya, Jaideep
    Atluri, Vijayalakshmi
    [J]. PROCEEDINGS OF THE NINTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY '19), 2019, : 153 - 155
  • [7] Combining Mandatory and Attribute-based Access Control
    Kerr, Lawrence
    Alves-Foss, Jim
    [J]. PROCEEDINGS OF THE 49TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS 2016), 2016, : 2616 - 2623
  • [8] A contextual attribute-based access control model
    Covington, Michael J.
    Sastry, Manoj R.
    [J]. On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, Pt 2, Proceedings, 2006, 4278 : 1996 - 2006
  • [9] Immediate attribute revocation in decentralized attribute-based access control
    Imine, Youcef
    Lounis, Ahmed
    Bouabdallah, Abdelmadjid
    [J]. 2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 33 - 40
  • [10] Monotonicity and completeness in attribute-based access control
    Crampton, Jason
    Morisset, Charles
    [J]. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8743 : 33 - 48