429 Hits in 4.8 sec

The authorization leap from rights to attributes

Ravi Sandhu
2012 Proceedings of the 17th ACM symposium on Access Control Models and Technologies - SACMAT '12  
The cyber security research community has a responsibility to develop models, theories and systems which enable safe and chaos-free deployment of ABAC.  ...  We argue that the potential benefits will lead to pervasive deployment of attribute-based access control (ABAC), and more generally attribute-based security.  ...  Acknowledgments The author's work is partially supported by grants from AFOSR, NSF and the State of Texas.  ... 
doi:10.1145/2295136.2295150 dblp:conf/sacmat/Sandhu12 fatcat:vlkeg7wwincn5c5c7mpmjqui6a

Deploying ABAC policies using RBAC systems

Gunjan Batra, Vijayalakshmi Atluri, Jaideep Vaidya, Shamik Sural
2019 Journal of Computer Security  
We experimentally demonstrate that time taken to evaluate an access request in RBAC and TRBAC systems is significantly less than that of the corresponding ABAC system.  ...  Essentially, we propose a method for the translation of an ABAC policy (including time constraints) into a form that can be adopted by an RBAC/TRBAC system.  ...  Acknowledgments Research reported in this publication was supported by the National Institutes of Health under award R01GM118574, by the National Science Foundation under awards CNS-1564034 and CNS-1624503  ... 
doi:10.3233/jcs-191315 pmid:31929684 pmcid:PMC6953980 fatcat:njb7typnzzez5nb2s3sgu447fu

An Intelligent Access Control Model [chapter]

Shadha Mohamed Sulaiyam ALAmri
2021 Quality Control in Intelligent Manufacturing [Working Title]  
The results show better performance in the term of computation speed.  ...  This proposed enhancement is implemented through a framework based on AI (Artificial Intelligent) to meet the requirements of dynamic systems. The framework is tested in the OpenStack testbed.  ...  A significant amount of research has been conducted regarding the principle of Separation of Duty (SoD) in RBAC; however, SoD deployment in ABAC remains a problem [22] .  ... 
doi:10.5772/intechopen.95459 fatcat:kxm42pk47balzdmtxqueqapg3a

Security Middleground for Resource Protection in Measurement Infrastructure-as-a-Service

Ravi Akella, Saptarshi Debroy, Prasad Calyam, Alex Berryman, Kunpeng Zhu, Mukundan Sridharan
2016 IEEE Transactions on Services Computing  
In this paper, we advocate the design of a security middleground between default open/closed access settings and present policy-driven access controls of measurement functions for a multi-domain federation  ...  Our middleware enables 'user-to-service' and 'service-to-service' authentication, and enforces federated authorization entitlement policies for timely orchestration of MIaaS services.  ...  We particularly build upon best practices of RBAC/ABAC hybrid approaches [44] , the work by authors in [45] where they verify secured cross-domain RBAC policies, and the work in [39] where chosen  ... 
doi:10.1109/tsc.2016.2618792 fatcat:25dcxv3kvzcova5bw3knjfpvba

Fine Grained Access Control Based on Smart Contract for Edge Computing

Yong Zhu, Xiao Wu, Zhihui Hu
2022 Electronics  
SCAC (Smart Contract-based Access Control) is based on ABAC (Attributes Based Access Control) and RBAC (Role Based Access Control).  ...  The research objective is to combine the efficiency of service orchestration in edge computing with the security of consensus mechanism in blockchain, making full use of smart contract programmability  ...  Acknowledgments: The authors acknowledge the fund of State Key Laboratory of Computer Architecture (ICT, CAS) (grant no.  ... 
doi:10.3390/electronics11010167 fatcat:bx4cvnqr4zgbjj7hnttkvmsgha

An Attribute-Based Access Control Model in RFID Systems Based on Blockchain Decentralized Applications for Healthcare Environments

Figueroa, Añorga, Arrizabalaga
2019 Computers  
in the ABAC model in order to provide the security of RFID systems.  ...  In this manuscript, we implement an ABAC model in RFID systems based on a decentralized model such as blockchain. Common criteria for the selection of the appropriate blockchain are detailed.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/computers8030057 fatcat:n2kue3yqjnff7cgr54j5a64f3e

BlendCAC: A BLockchain-ENabled Decentralized Capability-based Access Control for IoTs [article]

Ronghua Xu, Yu Chen, Erik Blasch, Genshe Chen
2018 arXiv   pre-print
In this paper, BlendCAC, a blockchain enabled decentralized capability based AC is proposed for the security of IoTs.  ...  The BlendCAC aims at an effective access control processes to devices, services and information in large scale IoT systems.  ...  As shown by Fig. 4 , the BlendCAC also has lower latency than RBAC and ABAC in most period of time.  ... 
arXiv:1804.09267v1 fatcat:gybholdhv5c4hktfhuzpmbjrcy

From Conventional to State-of-the-Art IoT Access Control Models

Ahmad Kamran Malik, Naina Emmanuel, Sidra Zafar, Hasan Ali Khattak, Basit Raza, Sarmadullah Khan, Ali H. Al-Bayatti, Madini O. Alassafi, Ahmed S. Alfakeeh, Mohammad A. Alqarni
2020 Electronics  
The advent in Online Social Networks (OSN) and Internet of Things (IoT) has created a new world of collaboration and communication between people and devices.  ...  The survey provides a review of the requirements for access control enforcement, discusses several security issues in access control, and elaborates underlying principles and limitations of famous access  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/electronics9101693 fatcat:mtvlbubbyvbx5ph2bnfwnmlbqa

Access Control Models in NoSQL Databases: An Overview

Ashwaq A. Alotaibi, Reem M. Alotaibi and Nermin Hamza Ashwaq A. Alotaibi, Reem M. Alotaibi and Nermin Hamza
2019 journal of king abdulaziz university computing and information technology sciences  
This paper reviews the different models of NoSQL databases and the security issues concerning these databases. In addition, we present the existing access control models in different NoSQL databases.  ...  As a large number of people storing sensitive data in NoSQL databases, security issues become critical concerns.  ...  In addition, the ABAC model elastic enough to support the implementation of content-based, context-based and purpose-based policies [28] .  ... 
doi:10.4197/comp.8-1.1 fatcat:scrsnvu4frhajhp2elqq3t2ucu

Protocol-Based and Hybrid Access Control for the IoT: Approaches and Research Opportunities

Shantanu Pal, Zahra Jadidi
2021 Sensors  
Access control determines the use of resources only to the specified and authorized users based on appropriate policy enforcement.  ...  In this paper, we discuss the potential for employing protocol-based and hybrid access control for IoT systems and examine how that can overcome the limitations of traditional access control mechanisms  ...  Acknowledgments: The authors acknowledge the support of the Commonwealth of Australia and Cybersecurity Research Centre Limited. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/s21206832 pmid:34696053 fatcat:blclfxxkxbf3tlkppyjdvef5fm

A Survey of Context-Aware Access Control Mechanisms for Cloud and Fog Networks: Taxonomy and Open Research Issues

A. S. M. Kayes, Rudri Kalaria, Iqbal H. Sarker, Md. Saiful Islam, Paul A. Watters, Alex Ng, Mohammad Hammoudeh, Shahriar Badsha, Indika Kumara
2020 Sensors  
and environmental contexts) which are gaining a lot of momentum in the area of industrial sensor and cloud networks.  ...  We conclude the paper with an in-depth analysis of the research challenges that have not been adequately addressed in the literature and highlight directions for future work that has not been well aligned  ...  The building blocks of the ABAC, RBAC, DAC and MAC systems are already discussed in Section 2.  ... 
doi:10.3390/s20092464 pmid:32349242 fatcat:77owmk23lbej5aqyllwkcmoxt4

EAR-ABAC: An Extended AR-ABAC Access Control Model for SDN-Integrated Cloud Computing

Khaled Riad, Zhu Yan
2015 International Journal of Computer Applications  
Where the author's AR-ABAC access control model [15] is extended to suit the SDN-integrated cloud environment distinguished nature.  ...  The extended model can make the election process about the number of attributes considered for making access decisions.  ...  Acknowledgment The authors would like to thank the National Natural Foundation of China for partly supporting this work (Grant No. 61472032 and 61170264).  ... 
doi:10.5120/ijca2015907649 fatcat:ayv4pey3rzftxoepxfsyxfgglm

An Access Control Model for Web Services with Dynamic Separation of Duty Rules

Hadiseh SeyyedAlipour, Mehdi Sabbari, Eslam Nazemi
2012 International Journal of Computer Applications  
One of the underlined issues in this model is Separation of Duty (SoD) policy, which is widely considered to be a fundamental security principle for prevention of fraud and errors in information security  ...  In these processes, shared resources are often used and there are complex relationships between activities and users, so the definition and administration of different security levels (tasks, users, resources  ...  One additional benefit to Web service implementations of ABAC lies in the nature of the loose definition of subjects. . )) ( ), ( ), ( ( ) Because ABAC provides the flexibility to associate policy rules  ... 
doi:10.5120/5694-7469 fatcat:zqgwxr2jffgvpkryq23s6k5uwm

A Decentralized Blockchain-based Architecture for a Secure Cloud-Enabled IoT

Mbarek Marwan, Abdelkarim Ait Temghart, Fatima Sifou, Feda AlShahwan
2020 Journal of Mobile Multimedia  
The simulation results show that the proposal is an efficient way of implementing ubiquitous and cognitive tools for smart healthcare systems.  ...  The integration of cloud computing and Internet of Things (IoT) offers a promising, rich platform for data collection and analysis in smart healthcare.  ...  Table 1 1 Advantages and disadvantages of existing access control systems Models Pros Cons DAC -It enables faster development and -It is limited in its scalability. deployment.  ... 
doi:10.13052/jmm1550-4646.1636 fatcat:ijenhwanlbfizguf627huskfpa

Towards a Secure and Borderless Collaboration between Organizations: An Automated Enforcement Mechanism

Samira Haguouche, Zahi Jarir
2018 Security and Communication Networks  
Several access control models are defined in the literature and this multitude of models creates heterogeneity of access control policies between the collaborating organizations.  ...  During the last decade, organizations have been more and more aware of the benefits of engaging in collaborative activities.  ...  Conflicts of Interest The authors declare that there are no conflicts of interest regarding the publication of this paper.  ... 
doi:10.1155/2018/1572812 fatcat:e5soqdlf4bdbbfcrwkwgr26i2i
« Previous Showing results 1 — 15 out of 429 results