[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Attribute-Based Access Control

Published: 01 February 2015 Publication History

Abstract

Attribute-based access control (ABAC) is a flexible approach that can implement AC policies limited only by the computational language and the richness of the available attributes, making it ideal for many distributed or rapidly changing environments.

References

[1]
V.C. Hu et al., Guide to Attribute Based Access Control (ABAC) Definition and Considerations, NIST Special Publication 800-162, Nat’l Institute of Standards and Technology, Jan. 2014; http://nvlpubs.nist.gov/nistpubs/specialpublications/NIST.sp.800-162.pdf.
[2]
V.C. Hu, D.F. Ferraiolo, and D.R. Kuhn, Assessment of Access Control Systems, NIST Interagency Report 7316, Nat’l Institute of Standards and Technology, Mar. 2006; http://csrc.nist.gov/publications/nistir/7316/NISTIR-7316.pdf.
[3]
Avatier Corp., “Leveraging Today's Megatrends to Drive the Future of Identity Management,” video presentation, Gartner Identity and Access Management (IAM) Summit, 2012; www.avatier.com/products/identity-management/resources/gartner-iam-2020-predictions.
[4]
D.R. Kuhn, E.J. Coyne, and T.R. Weil, “Adding Attributes to Role Based Access Control,” Computer, vol. 43, no. 6,2010, pp. 79–81.

Cited By

View all
  • (2024)Cooperative Specification via Composition ControlProceedings of the 17th ACM SIGPLAN International Conference on Software Language Engineering10.1145/3687997.3695635(2-15)Online publication date: 17-Oct-2024
  • (2024)How We Built Cedar: A Verification-Guided ApproachCompanion Proceedings of the 32nd ACM International Conference on the Foundations of Software Engineering10.1145/3663529.3663854(351-357)Online publication date: 10-Jul-2024
  • (2024)Cedar: A New Language for Expressive, Fast, Safe, and Analyzable AuthorizationProceedings of the ACM on Programming Languages10.1145/36498358:OOPSLA1(670-697)Online publication date: 29-Apr-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Computer
Computer  Volume 48, Issue 2
Feb. 2015
82 pages

Publisher

IEEE Computer Society Press

Washington, DC, United States

Publication History

Published: 01 February 2015

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Cooperative Specification via Composition ControlProceedings of the 17th ACM SIGPLAN International Conference on Software Language Engineering10.1145/3687997.3695635(2-15)Online publication date: 17-Oct-2024
  • (2024)How We Built Cedar: A Verification-Guided ApproachCompanion Proceedings of the 32nd ACM International Conference on the Foundations of Software Engineering10.1145/3663529.3663854(351-357)Online publication date: 10-Jul-2024
  • (2024)Cedar: A New Language for Expressive, Fast, Safe, and Analyzable AuthorizationProceedings of the ACM on Programming Languages10.1145/36498358:OOPSLA1(670-697)Online publication date: 29-Apr-2024
  • (2024)GAZETA: GAme-Theoretic ZEro-Trust Authentication for Defense Against Lateral Movement in 5G IoT NetworksIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.332697519(540-554)Online publication date: 1-Jan-2024
  • (2024)HoBACDSLProcedia Computer Science10.1016/j.procs.2024.08.008241:C(40-47)Online publication date: 18-Nov-2024
  • (2024)Using private set intersection to achieve privacy-preserving authorization for IoT systemsJournal of Information Security and Applications10.1016/j.jisa.2024.10375983:COnline publication date: 1-Jun-2024
  • (2024)Smart contracts attribute-based access control model for security & privacy of IoT system using blockchain and edge computingThe Journal of Supercomputing10.1007/s11227-023-05517-480:2(1396-1425)Online publication date: 1-Jan-2024
  • (2024)StuChain: an efficient blockchain-based student e-portfolio platform integrating hybrid access control approachMultimedia Tools and Applications10.1007/s11042-023-15560-183:1(227-251)Online publication date: 1-Jan-2024
  • (2024)Distributed AgriFood Supply ChainsJournal of Network and Systems Management10.1007/s10922-024-09839-332:3Online publication date: 27-Jun-2024
  • (2024)Social Control and Interactivity in Anonymous Public EventsComputer Security – ESORICS 202410.1007/978-3-031-70890-9_6(104-122)Online publication date: 16-Sep-2024
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media