Current Research and Open Problems in Attribute-Based Access Control

被引:147
|
作者
Servos, Daniel [1 ,2 ]
Osborn, Sylvia L. [1 ,2 ]
机构
[1] Univ Western Ontario, London, ON, Canada
[2] Western Univ, Dept Comp Sci, Middlesex Coll, London, ON N6A 5B7, Canada
关键词
Attribute-based access control (ABAC); access control; ABAC models; survey; CONTROL MODEL; TRUST; ARCHITECTURE; ENCRYPTION;
D O I
10.1145/3007204
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Attribute-based access control (ABAC) is a promising alternative to traditional models of access control (i.e., discretionary access control (DAC), mandatory access control (MAC), and role-based access control (RBAC)) that is drawing attention in both recent academic literature and industry application. However, formalization of a foundational model of ABAC and large scale adoption is still in its infancy. The relatively recent emergence of ABAC still leaves a number of problems unexplored. Issues like delegation, administration, auditability, scalability, hierarchical representations, and the like, have been largely ignored or left to future work. This article provides a basic introduction to ABAC and a comprehensive review of recent research efforts toward developing formal models of ABAC. A taxonomy of ABAC research is presented and used to categorize and evaluate surveyed articles. Open problems are identified based on the shortcomings of the reviewed works and potential solutions discussed.
引用
收藏
页数:45
相关论文
共 50 条
  • [1] An Attribute-based Access Control with Flexible Attribute Change in Open Systems
    Ye, Tao
    Cai, Yongquan
    [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON MECHATRONICS ENGINEERING AND INFORMATION TECHNOLOGY (ICMEIT 2017), 2017, 70 : 101 - 105
  • [2] The research on attribute-based access control model for web
    Zhang, Hongqi
    Zhou, Jing
    Chen, Hongwu
    [J]. 2007 INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE & TECHNOLOGY, PROCEEDINGS, 2007, : 1126 - 1128
  • [3] Attribute-Based Access Control
    Hu, Vincent C.
    Kuhn, D. Richard
    Ferraiolo, David F.
    [J]. COMPUTER, 2015, 48 (02) : 85 - 88
  • [4] PTaCL: A Language for Attribute-Based Access Control in Open Systems
    Crampton, Jason
    Morisset, Charles
    [J]. PRINCIPLES OF SECURITY AND TRUST, POST 2012, 2012, 7215 : 390 - 409
  • [5] Using attribute-based access control to enable attribute-based messaging
    Bobba, Rakesh
    Fatemieh, Omid
    Khan, Fariba
    Gunter, Carl A.
    Khurana, Himanshu
    [J]. 22ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2006, : 403 - +
  • [6] Attribute-Based Oblivious Access Control
    Han, Jinguang
    Susilo, Willy
    Mu, Yi
    Yan, Jun
    [J]. COMPUTER JOURNAL, 2012, 55 (10): : 1202 - 1215
  • [7] Mining Attribute-Based Access Control Policies
    Davari, Maryam
    Zulkernine, Mohammad
    [J]. INFORMATION SYSTEMS SECURITY, ICISS 2022, 2022, 13784 : 186 - 201
  • [8] Monotonicity and Completeness in Attribute-Based Access Control
    Crampton, Jason
    Morisset, Charles
    [J]. SECURITY AND TRUST MANAGEMENT (STM 2014), 2014, 8743 : 33 - 48
  • [9] ABACaaS: Attribute-Based Access Control as a Service
    Meshram, Augustee
    Das, Saptarshi
    Sural, Shamik
    Vaidya, Jaideep
    Atluri, Vijayalakshmi
    [J]. PROCEEDINGS OF THE NINTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY '19), 2019, : 153 - 155
  • [10] Mining Attribute-Based Access Control Policies
    Xu, Zhongyuan
    Stoller, Scott D.
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2015, 12 (05) : 533 - 545