An Administrative Model for Relationship-Based Access Control

被引:9
|
作者
Stoller, Scott D. [1 ]
机构
[1] SUNY Stony Brook, Dept Comp Sci, Stony Brook, NY 11794 USA
关键词
ONLINE SOCIAL NETWORKS;
D O I
10.1007/978-3-319-20810-7_4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Relationship-based access control (ReBAC) originated in the context of social network systems and recently is being generalized to be suitable for general computing systems. This paper defines a ReBAC model, based on Crampton and Sellwood's RPPM model, designed to be suitable for general computing systems. Our ReBAC model includes a comprehensive administrative model. The administrative model is comprehensive in the sense that it allows and controls changes to all aspects of the ReBAC policy. To the best of our knowledge, it is the first comprehensive administrative model for a ReBAC model suitable for general computing systems. The model is illustrated with parts of a sample access control policy for electronic health records in a healthcare network.
引用
收藏
页码:53 / 68
页数:16
相关论文
共 50 条
  • [1] Semantic Representation of RTBAC: Relationship-Based Access Control Model
    Chae, Song-hwa
    Kim, Wonil
    [J]. ADVANCES IN WEB AND NETWORK TECHNOLOGIES, AND INFORMATION MANAGEMENT, PROCEEDINGS, 2007, 4537 : 554 - +
  • [2] Relationship-based access control: More than a social network access control model
    Lobo, Jorge
    [J]. WILEY INTERDISCIPLINARY REVIEWS-DATA MINING AND KNOWLEDGE DISCOVERY, 2019, 9 (02)
  • [3] Mining Relationship-Based Access Control Policies
    Thang Bui
    Stoller, Scott D.
    Li, Jiajie
    [J]. PROCEEDINGS OF THE 22ND ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'17), 2017, : 239 - 246
  • [4] Policy templates for relationship-based access control
    Aktoudianakis, Evangelos
    Crampton, Jason
    Schneider, Steve
    Treharne, Helen
    Waller, Adrian
    [J]. 2013 ELEVENTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2013, : 221 - 228
  • [5] Relationship-based federated access control model for EPC Discovery Service
    Liu, Bing
    Chu, Chao-Hsien
    [J]. COMPUTERS & SECURITY, 2015, 55 : 251 - 270
  • [6] Security Analysis of Relationship-Based Access Control Policies
    Masoumzadeh, Amirreza
    [J]. PROCEEDINGS OF THE EIGHTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'18), 2018, : 186 - 195
  • [7] Active Learning of Relationship-Based Access Control Policies
    Iyer, Padmavathi
    Masoumzadeh, Amirreza
    [J]. SACMAT'20: PROCEEDINGS OF THE 25TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2020, : 155 - 166
  • [8] Performance analysis of Relationship-Based Access Control in OSNs
    Carminati, Barbara
    Ferrari, Elena
    Girardi, Jacopo
    [J]. 2012 IEEE 13TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI), 2012, : 449 - 456
  • [9] A User-to-User Relationship-Based Access Control Model for Online Social Networks
    Cheng, Yuan
    Park, Jaehong
    Sandhu, Ravi
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXVI, 2012, 7371 : 8 - 24
  • [10] Classifying and Comparing Attribute-Based and Relationship-Based Access Control
    Ahmed, Tahmina
    Sandhu, Ravi
    Park, Jaehong
    [J]. PROCEEDINGS OF THE SEVENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'17), 2017, : 59 - 70