2017
DOI: 10.1145/3007204
|View full text |Cite
|
Sign up to set email alerts
|

Current Research and Open Problems in Attribute-Based Access Control

Abstract: Attribute-based access control (ABAC) is a promising alternative to traditional models of access control (i.e., discretionary access control (DAC), mandatory access control (MAC), and role-based access control (RBAC)) that is drawing attention in both recent academic literature and industry application. However, formalization of a foundational model of ABAC and large scale adoption is still in its infancy. The relatively recent emergence of ABAC still leaves a number of problems unexplored. Issues like delegat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
68
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 187 publications
(68 citation statements)
references
References 77 publications
0
68
0
Order By: Relevance
“…Since ℎ( ) and ( ) are commonsensically positive, we find an inverse correlation between the incremental usability Δ and the threshold in expression (13); that is, a lower leads to more approvals on requests. Apparently, the FBAC would deteriorate to standard ABAC if tends to the upper bound, i.e., the value 1 in our case.…”
Section: Usability and Securitymentioning
confidence: 79%
See 1 more Smart Citation
“…Since ℎ( ) and ( ) are commonsensically positive, we find an inverse correlation between the incremental usability Δ and the threshold in expression (13); that is, a lower leads to more approvals on requests. Apparently, the FBAC would deteriorate to standard ABAC if tends to the upper bound, i.e., the value 1 in our case.…”
Section: Usability and Securitymentioning
confidence: 79%
“…Meanwhile, the academic community has also invested significant effort in this research area [13]. Li et al [14] conducted in-depth discussions on the inherent logical relations and system architecture of ABAC.…”
Section: Related Workmentioning
confidence: 99%
“…It substantiates the reaching of these systems to the flexible and trustable access control technology much faster [20]. However, this flexibility increases the occurrences of policy conflicts and makes the maintenance and administration of the policies difficult [48][49][50][51]. After a time period, the developers decided that ABAC is not efficient in system control because the access permissions given according to the attributes of the users became insufficient and unproductive.…”
Section: Attribute Based Access Controlmentioning
confidence: 93%
“…The unit that assigns the authorities is the person who is the owner of the objects called Owner; thus, he also determines the security principles. The owner gives the necessary authorization to individuals in the system, introduces limitations, and limits their access to the system according to his own will [12,51]. Although the most important feature of this system is the fact that it has a high level of security, it cannot distinguish between the subjects and object domains and has security leaks [57][58][59][60].…”
Section: Discretionary Access Controlmentioning
confidence: 99%
“…An attribute defines the characteristics of an entity. For example, for subjects (users or applications) attributes can include name, organisation, title, for resources, size, date, performance and for environments, date, time and physical location [37]. In ABAC, policies are formulated as attribute expressions and access is granted if the requirements of a policy is satisfied.…”
Section: Background and Problem Statementmentioning
confidence: 99%