[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1066677.1066760acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
Article

An attribute-based access matrix model

Published: 13 March 2005 Publication History

Abstract

In traditional access control models like MAC, DAC, and RBAC, authorization decisions are determined according to identities of subjects and objects, which are authenticated by a system completely. Modern access control practices, such as DRM, trust management, and usage control, require flexible authorization policies. In such systems, a subject may be only partially authenticated according to one or more attributes. In this paper we propose an attribute-based access matrix model, named ABAM, which extends the access matrix model. We show that ABAM enhances the expressive power of the access matrix model by supporting attribute-based authorizations. Specifically, ABAM is comprehensive enough to encompass traditional access control models as well as some usage control concepts and specifications. On the other side, expressive power and safety are two fundamental but conflictive objectives in an access control model. We study the safety property of ABAM and conclude that the safety problem is decidable for a restricted case where attribute relationships allow no cycles. The restricted case is shown to be reasonable enough to model practical systems.

References

[1]
M. A. Al-Kahtani and R. Sandhu. A model for attribute-based user-role assignment. In Annual Computer Security Applications Conference, 2002.
[2]
M. H. Harrison, W. L. Ruzzo, and J. D. Ullman. Protection in operating systems. Communications of the ACM, 19(8):461--471, 1976.
[3]
N. Li, W. H. Winsborough, and J. C. Mitchell. Design of a role-based trust management framework. In IEEE Symposium on Security and Privacy, pages 114--130, 2002.
[4]
R. J. Lipton and L. Snyder. A linear time algorithm for deciding subject security. Journal of ACM, 24(3):455--464, 1977.
[5]
J. Park and R. Sandhu. The uconabc usage control model. ACM Transactions on Information and Systems Security, 2004.
[6]
R. S. Sandhu. The schematic protection model: Its definition and analysis for acyclic attenuating schemes. Journal of ACM, 35(2):404--432, 1988.
[7]
R. S. Sandhu. The typed access matrix model. In IEEE Symposium on Security and Privacy, pages 122--136, 1992.
[8]
M. Soshi. Safety analysis of the dynamic-typed access matrix model. In Proc. 6th European Symposium on Research in Computer Security, 2000.

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
SAC '05: Proceedings of the 2005 ACM symposium on Applied computing
March 2005
1814 pages
ISBN:1581139640
DOI:10.1145/1066677
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 13 March 2005

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. access control
  2. access matrix model
  3. decidability
  4. safety analysis

Qualifiers

  • Article

Conference

SAC05
Sponsor:
SAC05: The 2005 ACM Symposium on Applied Computing
March 13 - 17, 2005
New Mexico, Santa Fe

Acceptance Rates

Overall Acceptance Rate 1,650 of 6,669 submissions, 25%

Upcoming Conference

SAC '25
The 40th ACM/SIGAPP Symposium on Applied Computing
March 31 - April 4, 2025
Catania , Italy

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)0
Reflects downloads up to 31 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Hierarchical password capabilitiesInternational Journal of Parallel, Emergent and Distributed Systems10.1080/17445760.2024.237631639:5(572-588)Online publication date: 9-Jul-2024
  • (2024)Research on Authorization Model of Attribute Access Control Based on Knowledge GraphUbiquitous Security10.1007/978-981-97-1274-8_23(348-359)Online publication date: 13-Mar-2024
  • (2023)Split consensus for object securityInternational Journal of Parallel, Emergent and Distributed Systems10.1080/17445760.2023.222521738:5(327-341)Online publication date: 15-Jun-2023
  • (2022)Cryptographic pointers for fine-grained file access securityInformation Security Journal: A Global Perspective10.1080/19393555.2022.203336531:3(359-375)Online publication date: 28-Feb-2022
  • (2022)A paradigm for secure object access and unrestricted mobility in distributed systemsInternational Journal of Parallel, Emergent and Distributed Systems10.1080/17445760.2022.209538437:5(571-588)Online publication date: 7-Jul-2022
  • (2022)A Study on Current Research and Challenges in Attribute-based Access Control ModelIntelligent Data Communication Technologies and Internet of Things10.1007/978-981-16-7610-9_2(17-31)Online publication date: 28-Feb-2022
  • (2021)Access Control Challenges in Enterprise EcosystemsResearch Anthology on Blockchain Technology in Business, Healthcare, Education, and Government10.4018/978-1-7998-5351-0.ch029(503-528)Online publication date: 2021
  • (2020)Access control of blockchain based on dual-policy attribute-based encryption2020 IEEE 22nd International Conference on High Performance Computing and Communications; IEEE 18th International Conference on Smart City; IEEE 6th International Conference on Data Science and Systems (HPCC/SmartCity/DSS)10.1109/HPCC-SmartCity-DSS50907.2020.00200(1282-1290)Online publication date: Dec-2020
  • (2020)A survey on access control mechanisms for cloud computingTransactions on Emerging Telecommunications Technologies10.1002/ett.372031:2Online publication date: 16-Feb-2020
  • (2019)Access Control Challenges in Enterprise EcosystemsGlobal Cyber Security Labor Shortage and International Business Risk10.4018/978-1-5225-5927-6.ch004(51-76)Online publication date: 2019
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media