Current Research and Open Problems in Attribute-Based Access Control

被引:148
|
作者
Servos, Daniel [1 ,2 ]
Osborn, Sylvia L. [1 ,2 ]
机构
[1] Univ Western Ontario, London, ON, Canada
[2] Western Univ, Dept Comp Sci, Middlesex Coll, London, ON N6A 5B7, Canada
关键词
Attribute-based access control (ABAC); access control; ABAC models; survey; CONTROL MODEL; TRUST; ARCHITECTURE; ENCRYPTION;
D O I
10.1145/3007204
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Attribute-based access control (ABAC) is a promising alternative to traditional models of access control (i.e., discretionary access control (DAC), mandatory access control (MAC), and role-based access control (RBAC)) that is drawing attention in both recent academic literature and industry application. However, formalization of a foundational model of ABAC and large scale adoption is still in its infancy. The relatively recent emergence of ABAC still leaves a number of problems unexplored. Issues like delegation, administration, auditability, scalability, hierarchical representations, and the like, have been largely ignored or left to future work. This article provides a basic introduction to ABAC and a comprehensive review of recent research efforts toward developing formal models of ABAC. A taxonomy of ABAC research is presented and used to categorize and evaluate surveyed articles. Open problems are identified based on the shortcomings of the reviewed works and potential solutions discussed.
引用
收藏
页数:45
相关论文
共 50 条
  • [21] Attribute Expressions, Policy Tables and Attribute-Based Access Control
    Crampton, Jason
    Williams, Conrad
    [J]. PROCEEDINGS OF THE 22ND ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'17), 2017, : 79 - 90
  • [22] Semantic Attribute-Based Access Control: A review on current status and future perspectives
    Arshad, Hamed
    Johansen, Christian
    Owe, Olaf
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2022, 129
  • [23] Attribute-based data access control in mobile cloud computing: Taxonomy and open issues
    Sookhak, Mehdi
    Yu, F. Richard
    Khan, Muhammad Khurram
    Xiang, Yang
    Buyya, Rajkumar
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 72 : 273 - 287
  • [24] A New Attribute-Based Access Control Model for RDBMS
    Al-Saraireh, Jaafer
    Hassan, Majid
    [J]. CYBERNETICS AND INFORMATION TECHNOLOGIES, 2022, 22 (04) : 3 - 22
  • [25] On the Feasibility of Attribute-Based Access Control Policy Mining
    Chakraborty, Shuvra
    Sandhu, Ravi
    Krishnan, Ram
    [J]. 2019 IEEE 20TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION FOR DATA SCIENCE (IRI 2019), 2019, : 245 - 252
  • [26] Enabling Attribute-Based Access Control in NoSQL Databases
    Gupta, Eeshan
    Sural, Shamik
    Vaidya, Jaideep
    Atluri, Vijayalakshmi
    [J]. IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2023, 11 (01) : 208 - 223
  • [27] Anonymity in Attribute-Based Access Control: Framework and Metric
    Zhang, Runnan
    Liu, Gang
    Kang, Hongzhaoning
    Wang, Quan
    Wan, Bo
    Luo, Nan
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (01) : 463 - 475
  • [28] Attribute-Based Access Control for Layered Grid Resources
    Lang, Bo
    Li, Hangyu
    Ni, Wenting
    [J]. COMMUNICATION AND NETWORKING, PT II, 2010, 120 : 31 - 40
  • [29] Attribute-Based Access Control Architectures with the eIDAS Protocols
    Morgner, Frank
    Bastian, Paul
    Fischlin, Marc
    [J]. SECURITY STANDARDISATION RESEARCH, SSR 2016, 2016, 10074 : 205 - 226
  • [30] Efficient Attribute-Based Comparable Data Access Control
    Wang, Zhijie
    Huang, Dijiang
    Zhu, Yan
    Li, Bing
    Chung, Chun-Jen
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2015, 64 (12) : 3430 - 3443