Constraints Validation in Privacy-Preserving Attribute-Based Access Control

被引:0
|
作者
Oleshchuk, Vladimir [1 ]
机构
[1] Univ Agder, Dept ICT, Postboks 509, N-4876 Grimstad, Norway
关键词
ABAC; access control; security; credentials; attributes; constraints; privacy; pseudonyms;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Attribute-Based Access Control (ABAC) has been found to be extremely useful and flexible and has drawn a lot of research in recent years. It was observed that in the context of new emerging applications, attributes play an increasingly important role both in defining and enforcing more elaborated and flexible security policies. Recently, NIST has proposed more formal definition of ABAC. In this paper we discuss a general privacy-preserving ABAC model (which combines both authentication and authorization) and propose an approach to handle constraints in such privacy preserving setting.
引用
收藏
页码:429 / 431
页数:3
相关论文
共 50 条
  • [21] Privacy-Preserving Attribute-Based Credentials in Cooperative Intelligent Transport Systems
    Neven, Gregory
    Baldini, Gianmarco
    Camenisch, Jan
    Neisse, Ricardo
    [J]. 2017 IEEE VEHICULAR NETWORKING CONFERENCE (VNC), 2017, : 131 - 138
  • [22] A Privacy-Preserving Attribute-Based Reputation System in Online Social Networks
    Linke Guo
    Chi Zhang
    Yuguang Fang
    Phone Lin
    [J]. Journal of Computer Science and Technology, 2015, 30 : 578 - 597
  • [23] An Integrated Privacy Preserving Attribute-Based Access Control Framework Supporting Secure Deduplication
    Xu, Runhua
    Joshi, James
    Krishnamurthy, Prashant
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (02) : 706 - 721
  • [24] A privacy-preserving attribute-based framework for IoT identity lifecycle management
    Garcia-Rodriguez, Jesus
    Skarmeta, Antonio
    [J]. COMPUTER NETWORKS, 2023, 236
  • [25] A Privacy-Preserving Attribute-Based Reputation System in Online Social Networks
    Guo, Linke
    Zhang, Chi
    Fang, Yuguang
    Lin, Phone
    [J]. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2015, 30 (03): : 578 - 597
  • [26] Attribute-Based encryption mechanism with Privacy-Preserving approach in cloud computing
    Yogesh Deshmukh, Jyoti
    Yadav, S.K.
    Bhandari, G.M.
    [J]. Materials Today: Proceedings, 2023, 80 : 1786 - 1791
  • [27] On the User Acceptance of Privacy-Preserving Attribute-Based Credentials - A Qualitative Study
    Sabouri, Ahmad
    [J]. DATA PRIVACY MANAGEMENT AND SECURITY ASSURANCE, 2016, 9963 : 130 - 145
  • [28] Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption
    Han, Jinguang
    Susilo, Willy
    Mu, Yi
    Yan, Jun
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2012, 23 (11) : 2150 - 2162
  • [29] PAAS: A Privacy-Preserving Attribute-based Authentication System for eHealth Networks
    Guo, Linke
    Zhang, Chi
    Sun, Jinyuan
    Fang, Yuguang
    [J]. 2012 IEEE 32ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), 2012, : 224 - 233
  • [30] Privacy-preserving Blockchain based IoT Ecosystem using Attribute-based Encryption
    Rahulamathavan, Yogachandran
    Phan, Raphael C-W
    Rajarajan, Muttukrishnan
    Misra, Sudip
    Kondoz, Ahmet
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON ADVANCED NETWORKS AND TELECOMMUNICATIONS SYSTEMS (ANTS), 2017,