Constraints Validation in Privacy-Preserving Attribute-Based Access Control

被引:0
|
作者
Oleshchuk, Vladimir [1 ]
机构
[1] Univ Agder, Dept ICT, Postboks 509, N-4876 Grimstad, Norway
关键词
ABAC; access control; security; credentials; attributes; constraints; privacy; pseudonyms;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Attribute-Based Access Control (ABAC) has been found to be extremely useful and flexible and has drawn a lot of research in recent years. It was observed that in the context of new emerging applications, attributes play an increasingly important role both in defining and enforcing more elaborated and flexible security policies. Recently, NIST has proposed more formal definition of ABAC. In this paper we discuss a general privacy-preserving ABAC model (which combines both authentication and authorization) and propose an approach to handle constraints in such privacy preserving setting.
引用
收藏
页码:429 / 431
页数:3
相关论文
共 50 条
  • [1] A Privacy-Preserving Attribute-Based Access Control Scheme
    Xu, Yang
    Zeng, Quanrun
    Wang, Guojun
    Zhang, Cheng
    Ren, Ju
    Zhang, Yaoxue
    [J]. SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE (SPACCS 2018), 2018, 11342 : 361 - 370
  • [2] Privacy-preserving attribute-based access control for grid computing
    Park, Sang M.
    Chung, Soon M.
    [J]. INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2014, 5 (04) : 286 - 296
  • [3] Privacy-Preserving Attribute-Based Encryption Supporting Expressive Access Structures
    Zhang, Liangxuan
    Li, Hui
    Zhang, Yinghui
    Khan, Fawad
    [J]. 2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC), 2017, : 475 - 482
  • [4] Privacy-Preserving Auditing for Attribute-Based Credentials
    Camenisch, Jan
    Lehmann, Anja
    Neven, Gregory
    Rial, Alfredo
    [J]. COMPUTER SECURITY - ESORICS 2014, PT II, 2014, 8713 : 109 - 127
  • [5] PriExpress: Privacy-Preserving Express Delivery with Fine-Grained Attribute-Based Access Control
    Li, Tao
    Zhang, Rui
    Zhang, Yanchao
    [J]. 2016 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2016, : 333 - 341
  • [6] Concepts and languages for privacy-preserving attribute-based authentication
    Camenisch, Jan
    Dubovitskaya, Maria
    Enderlein, Robert R.
    Lehmann, Anja
    Neven, Gregory
    Paquin, Christian
    Preiss, Franz-Stefan
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2014, 19 (01) : 25 - 44
  • [7] Blockchain-enabled efficient distributed attribute-based access control framework with privacy-preserving in IoV
    Zhang, Ye
    Zhang, Leyou
    Wu, Qing
    Mu, Yi
    [J]. JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (10) : 9216 - 9227
  • [8] Privacy-Preserving Attribute-Based Access Control Model for XML-Based Electronic Health Record System
    Seol, Kwangsoo
    Kim, Young-Gab
    Lee, Euijong
    Seo, Young-Duk
    Baik, Doo-Kwon
    [J]. IEEE ACCESS, 2018, 6 : 9114 - 9128
  • [9] Distance-Bounding, Privacy-Preserving Attribute-Based Credentials
    Bosk, Daniel
    Bouget, Simon
    Buchegger, Sonja
    [J]. CRYPTOLOGY AND NETWORK SECURITY, CANS 2020, 2020, 12579 : 147 - 166
  • [10] Privacy-Preserving Electronic Ticket Scheme with Attribute-Based Credentials
    Han, Jinguang
    Chen, Liqun
    Schneider, Steve
    Treharne, Helen
    Wesemeyer, Stephan
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (04) : 1836 - 1849