Combining Mandatory and Attribute-based Access Control

被引:4
|
作者
Kerr, Lawrence [1 ]
Alves-Foss, Jim [1 ]
机构
[1] Univ Idaho, Moscow, ID 83843 USA
基金
美国国家科学基金会;
关键词
D O I
10.1109/HICSS.2016.328
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute based access control (ABAC) offers a great deal of flexibility over more traditional forms of access control in that it relies less on user identity or role but on various attributes of a subject or object. In many instances where a traditional access control approach is taken, such as mandatory access control (MAC) environments, more information beyond a classification is desirable to make a more flexible access control determination. We propose an ABAC model that retains the nature of a strictly MAC approach, while enriching access control decisions with a number of other security attributes by leveraging the concept that classification, clearance, or any other security property of a subject or object is simply an attribute. The model description is followed by an example instance based on current DoD guidelines.
引用
收藏
页码:2616 / 2623
页数:8
相关论文
共 50 条
  • [31] Efficient Attribute-Based Comparable Data Access Control
    Wang, Zhijie
    Huang, Dijiang
    Zhu, Yan
    Li, Bing
    Chung, Chun-Jen
    IEEE TRANSACTIONS ON COMPUTERS, 2015, 64 (12) : 3430 - 3443
  • [32] Attribute-Based Access Control Architectures with the eIDAS Protocols
    Morgner, Frank
    Bastian, Paul
    Fischlin, Marc
    SECURITY STANDARDISATION RESEARCH, SSR 2016, 2016, 10074 : 205 - 226
  • [33] Levelled attribute-based encryption for hierarchical access control
    Le, Huy Quoc
    Le, Phi Thuong
    Trinh, Sy Tuan
    Susilo, Willy
    Trinh, Viet Cuong
    COMPUTER STANDARDS & INTERFACES, 2025, 93
  • [34] Attribute-based access control management for multicloud collaboration
    John, John C.
    Sural, Shamik
    Gupta, Arobinda
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (19):
  • [35] Deconflicting policies in attribute-based access control systems
    Yahiaoui, Mohamed
    Zinedine, Ahmed
    Harti, Mostafa
    2018 IEEE 5TH INTERNATIONAL CONGRESS ON INFORMATION SCIENCE AND TECHNOLOGY (IEEE CIST'18), 2018, : 130 - 136
  • [36] Attribute-based access control policies composition algebra
    Lin, Li
    Huai, Jin-Peng
    Li, Xian-Xian
    Ruan Jian Xue Bao/Journal of Software, 2009, 20 (02): : 403 - 414
  • [37] Towards Integrating Attribute-Based Access Control into Ontologies
    Dundua, Besik
    Rukhaia, Mikheil
    2019 IEEE 2ND UKRAINE CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (UKRCON-2019), 2019, : 1052 - 1056
  • [38] Attribute-based Access Control for ICN Naming Scheme
    Li, Bing
    Huang, Dijiang
    Wang, Zhijie
    Zhu, Yan
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (02) : 194 - 206
  • [39] Attribute-based access control model for cloud computing
    Wang, Jingyu
    Feng, Lixiao
    Zheng, Xuefeng
    Zhongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Central South University (Science and Technology), 2015, 46 (06): : 2090 - 2097
  • [40] Evolutionary Inference of Attribute-Based Access Control Policies
    Medvet, Eric
    Bartoli, Alberto
    Carminati, Barbara
    Ferrari, Elena
    EVOLUTIONARY MULTI-CRITERION OPTIMIZATION, PT I, 2015, 9018 : 351 - 365