2012
DOI: 10.1007/978-3-642-31540-4_4
|View full text |Cite
|
Sign up to set email alerts
|

A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC

Abstract: Recently, there has been considerable interest in attribute based access control (ABAC) to overcome the limitations of the dominant access control models (i.e, discretionary-DAC, mandatory-MAC and role based-RBAC) while unifying their advantages. Although some proposals for ABAC have been published, and even implemented and standardized, there is no consensus on precisely what is meant by ABAC or the required features of ABAC. There is no widely accepted ABAC model as there are for DAC, MAC and RBAC. This pape… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
213
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 324 publications
(213 citation statements)
references
References 28 publications
0
213
0
Order By: Relevance
“…It follows the Attribute-based access-control model (ABAC) [7] what, along with its extensibility, provides to the language enough flexibility to represent policies following different access-control models. Other approaches [15,19] describe languages and tools able to produce flexible access-control models.…”
Section: Xacml Policy Languagementioning
confidence: 99%
See 1 more Smart Citation
“…It follows the Attribute-based access-control model (ABAC) [7] what, along with its extensibility, provides to the language enough flexibility to represent policies following different access-control models. Other approaches [15,19] describe languages and tools able to produce flexible access-control models.…”
Section: Xacml Policy Languagementioning
confidence: 99%
“…However, several reason inclined us to choose XACML. First of all, thanks to its ABAC philosophy, XACML is able to represent a wider range of security policies (see [7] for the capabilities of ABAC to cover other AC models), while other extensible languages like SecureUML [10] will impose the use of RBAC. Secondly, being an standard language, we expect a wider adoption and a more consistent maintenance and evolution of the language.…”
Section: Xacml Policy Languagementioning
confidence: 99%
“…Firstly, by employing attribute-based access control (ABAC, [11]), XACML supports most of the rules required by the case study. Secondly, by employing policy trees (see Figure 1), XACML supports structuring multiple rules and reasoning about how these relate in case of conflict.…”
Section: Deny I F T H E Owning P a T I E N T Has Withdrawn C O N S mentioning
confidence: 99%
“…2. Our vision on policy specification: an application security expert should be able to specify policies for his or her specific organization and application by instantiating policy patterns represented as templates pre-defined by other experts access control (ABAC, [11]) and policy trees. Firstly, ABAC is a recent access control model that expresses rules in terms of key-value properties of the subject, the resource and the environment called attributes.…”
Section: Context and Problem Illustrationmentioning
confidence: 99%
“…The messages that can be sent using this tool are classified according their persistence. Also, users are managed via an Access Control List (ACL) [10], what ensures the security of access.…”
Section: Cooperative E-learning Using Schom Toolmentioning
confidence: 99%