نتایج جستجو برای: abac
تعداد نتایج: 142 فیلتر نتایج به سال:
Attribute-based Access Control (ABAC) policies are based on mutually processable policy attributes. Assigned permissions in such policies need to be reflected or combined with organisational constraints. Best practice in information security dictates having the operational need to access a particular information artifact independent from the function of the specific application systems. Consequ...
Moderne Anwendungen aus dem Bereich des e-Commerce, sowie Enterpriseund e-Government-Portale bringen aufgrund der Vielzahl höchst heterogener Benutzer und der Diversität der Informationsressourcen die Notwendigkeit für flexible Autorisierungsund Zugriffskontrollverfahren mit sich. Für den Zugriff auf derartige Anwendungen ist sicherzustellen, dass Benutzer die notwendigen Berechtigungen besitze...
This paper deals with the maintenance of PKI certificates for Attribute Based Access Control (ABAC). We show, that the current standard has several problems in different revocation and delegation processes. This may lead to a security hole allowing usage of ABAC certificates, when it was revoked or transferred. As a solution we suggest architecture changes, that allow to perform revocation and ...
Collaborative systems allow a group of organizations to collaborate and complete shared tasks through distributed platforms. Organizations who often leverage cloud-based solutions outsource their data benefit from the cloud capabilities. During such collaborations, tenants require access utilize resources held by other collaborating tenants, which are hosted across multiple providers. Ensuring ...
Attribute Based Access Control (ABAC) is becoming the reference model for the specification and evaluation of access control policies. In ABAC policies and access requests are defined in terms of pairs attribute names/values. The applicability of an ABAC policy to a request is determined by matching the attributes in the request with the attributes in the policy. Some languages supporting ABAC,...
In highly open systems like the Internet, attributebased access control (ABAC) has proven its appropriateness. This is reflected in the utilization of ABAC in authentication and authorization infrastructures (AAIs). However, specification and maintenance of ABAC policies has turned out to be complex and error-prone even in federations of limited size, especially if heterogeneous attribute schem...
Attribute-based Access Control (ABAC) extends traditional Access Control by considering an access request as a set of pairs attribute name-value, making it particularly useful in the context of open and distributed systems, where security relevant information can be collected from different sources. However, ABAC enables attribute hiding attacks, allowing an attacker to gain some access by with...
Attribute-based access control (ABAC) is a promising alternative to traditional models of access control (i.e. discretionary access control (DAC), mandatory access control (MAC) and role-based access control (RBAC)) that is drawing attention in both recent academic literature and industry application. However, formalization of a foundational model of ABAC and large scale adoption are still lack...
AIMS To explore young people's perceptions of alcohol advertising on Facebook and investigate perceived compliance with the Alcohol Beverages Advertising Code (ABAC). METHODS An online cross-sectional survey with 172 Australians aged 16-29 years recruited from a market research website and via Facebook. We compiled advertisements from six popular alcohol brands' Australian Facebook pages and ...
Recently, attribute-based access control (ABAC) has emerged as a convenient paradigm for specifying, enforcing and maintaining rich and flexible authorization policies, leveraging attributes originated frommultiple sources, e.g., operative systems, softwaremodules, remote services, etc. However, attackers may try to bypass ABAC policies by compromising such sources to forge the attributes they ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید