نتایج جستجو برای: ABAC

تعداد نتایج: 142  

2014
Zhongyuan Xu Scott D. Stoller

Attribute-based access control (ABAC) provides a high level of flexibility that promotes security and information sharing. ABAC policy mining algorithms have potential to significantly reduce the cost of migration to ABAC, by partially automating the development of an ABAC policy from information about the existing access-control policy and attribute data. This paper presents an algorithm for m...

2012
Xin Jin Ram Krishnan Ravi S. Sandhu

Recently, there has been considerable interest in attribute based access control (ABAC) to overcome the limitations of the dominant access control models (i.e, discretionary-DAC, mandatory-MAC and role based-RBAC) while unifying their advantages. Although some proposals for ABAC have been published, and even implemented and standardized, there is no consensus on precisely what is meant by ABAC ...

2016
Prosunjit Biswas Ravi S. Sandhu Ram Krishnan

Logical formulas and enumeration are the two major ways for specifying authorization policies in Attribute Based Access Control (ABAC). While considerable research has been done for specifying logical-formula authorization policy ABAC, there has been less attention to enumerated authorization policy ABAC. This paper presents a finite attribute, finite domain ABAC model for enumerated authorizat...

2016
Daniel Servos Sylvia L. Osborn

Attribute-Based Access Control (ABAC) is an emerging model of access control that has gained significant interest in both recent academic literature and industry application. However, to date there have been almost no attempts to incorporate the concept of dynamic delegation into ABAC. This work lays out a number of possible strategies for incorporating delegation into existing ABAC models and ...

2007
Christian Schläger Torsten Priebe Manuel Liewald Günther Pernul

Attribute-based access control (ABAC) is a very powerful and flexible security technique making it possible to overcome limitations of traditional role-based and discretionary access controls. ABAC enables the dynamic handling of vast numbers of heterogeneous and changing resources and users, a task especially relevant for E-Commerce or distributed computing. With an authentication and authoris...

2009
Christian Schläger Torsten Priebe Manuel Liewald Günther Pernul

Attribute-based access control (ABAC) is a very powerful and flexible security technique making it possible to overcome limitations of traditional role-based and discretionary access controls. ABAC enables the dynamic handling of vast numbers of heterogeneous and changing resources and users, a task especially relevant for E-Commerce or distributed computing. With an authentication and authoris...

2006
Adam J. Lee Marianne Winslett

In open computing systems, resources are shared across organizational boundaries in an effort to allow for greater access to information and easier collaboration between geographically and administratively dispersed groups. Designing adequate access control solutions for these types of systems is a challenging task, as traditional solutions tend to exhibit failures or other undesirable behavior...

2012
Sonu Verma Suresh Kumar Manjeet Singh

As the demand for data and information management increases, there is also a critical need for maintaining the security of the databases, applications and information systems. Data and information have to be protected from unauthorized access as well as from malicious corruption. With the advent of the web it is even more important to protect data and information as numerous individuals have ac...

2013
Leanid Krautsevich Aliaksandr Lazouski Fabio Martinelli Artsiom Yautsiukhin

Attribute-based Access Control (ABAC) was recently proposed as a general model which is able to capture the main existing access control models. This paper discusses the problems of configuring ABAC and engineering access policies. We question how to design attributes, how to assign attributes to subjects, objects, actions, and how to formulate access policies which bind subjects to objects and...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید