2019 11th International Conference on Advanced Computing (ICoAC) 2019
DOI: 10.1109/icoac48765.2019.246870
|View full text |Cite
|
Sign up to set email alerts
|

Performance Analysis of ABAC and ABAC with Trust (ABAC-T) in Fine Grained Access Control Model

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0
2

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 12 publications
0
5
0
2
Order By: Relevance
“…It can come from the protocol level or integrating various access control mechanisms into a single mechanism. For instance, trust is integrated into ABAC to improve system functionality, scalability, security when accessing a resource [94]. In this case, the concept of trust is considered an attribute to enforce access control rules and policy specifications.…”
Section: Discussion and Future Research Opportunitiesmentioning
confidence: 99%
“…It can come from the protocol level or integrating various access control mechanisms into a single mechanism. For instance, trust is integrated into ABAC to improve system functionality, scalability, security when accessing a resource [94]. In this case, the concept of trust is considered an attribute to enforce access control rules and policy specifications.…”
Section: Discussion and Future Research Opportunitiesmentioning
confidence: 99%
“…is access control model is called ABAC. Abirami et al added trust attribute values to ABAC, which are got from different trust evaluation algorithms or models, and used them to improve the security performance of the model [24,25]. Zhang et al use signatures to ensure that the verification process does not disclose attributes [26].…”
Section: Related Workmentioning
confidence: 99%
“…(2) When the bumps of the vehicle exceed normal conditions, the average bumps data of the road section can help judge whether the current vehicle is Various efficient authentication mechanisms Single, undiversified authentication result [20][21][22][23] Enhance the dynamic nature of RBAC, security, as far as possible to weaken the role of permissions encapsulation generated by the role of granularity issues ere is always the problem of static role permissions. e overall permission system cannot affect role permissions [24][25][26][27][28][29][30][31][32] e ABAC attribute mechanism is used to improve the granularity and the orderliness of permissions. To enhance ABAC security by adding unique attribute values ABAC makes the overall model more difficult to manage as the number of attributes increases.…”
Section: Permission Adjust Requirements In the Emergencies Of Thementioning
confidence: 99%
“…The application area of power IOT security covers all aspects of power production "generation, transmission, transformation, distribution, use and regulation" [8]. The network security system of power IOT adopts the form of independent networking for network deployment and is divided into three categories: encryption device, isolation device and platform operation device.…”
Section: Introductionmentioning
confidence: 99%