Constraints Specification in Attribute Based Access Control

نویسندگان

  • Khalid Zaman Bijon
  • Ram Krishnan
  • Ravi Sandhu
چکیده

Recently, attribute based access control (ABAC )has received considerable attention from the secu-rity community for its policy flexibility and dynamicdecision making capabilities. In ABAC, authoriza-tion decisions are made based on various attributesof entities involved in the access (e.g., users, sub-jects, objects, context, etc.). In an ABAC system,a proper attribute assignment to different entitiesis necessary for ensuring appropriate access. shouldbe constrained much like user-role assignments areconstrained in Role-Based Access Control. Althoughconsiderable research has been conducted on ABAC,so far constraints specification on attribute assign-ment to entities has not been well-studied in theliterature. In this paper, we propose an attribute-based constraints specification language (ABCL) forexpressing a variety of constraints on values that dif-ferent attributes of various entities in the system cantake. ABCL can be used to specify constraints on asingle attribute or across multiple attributes of a par-ticular entity. Furthermore, constraints on attributesassignment across multiple entities (e.g., attributesof different users) can also be specified. We showthat ABCL can specify several well-known constraintpolicies including separation of duty and cardinalitypolicies. We demonstrate the usefulness of ABCL indifferent usage scenarios including banking and cloudcomputing domains. We also discuss enforcement ofABCL constraints and its performance.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A combination of semantic and attribute-based access control model for virtual organizations

A Virtual Organization (VO) consists of some real organizations with common interests, which aims to provide inter organizational associations to reach some common goals by sharing their resources with each other. Providing security mechanisms, and especially a suitable access control mechanism, which enforces the defined security policy is a necessary requirement in VOs. Since VO is a complex ...

متن کامل

Constraints for Attribute Based Access Control with Application in Cloud Iaas Approved by Supervising Committee:

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . iv List of Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x List of Figures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xi Chapter 1: Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.1 Mo...

متن کامل

Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems

Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...

متن کامل

Rationale and Design of the Access Specification Language RASP

In this paper we describe the formal specification language RASP for expressing fine-grained access control constraints in information systems. The design of the language is motivated by a number of IS case studies which demonstrate the complexity of the access constraints which arise if minimal (need-to-know) access is to be strictly enforced. RASP supports modularity, parameterization, role a...

متن کامل

An automatic test case generator for evaluating implementation of access control policies

One of the main requirements for providing software security is the enforcement of access control policies which aim to protect resources of the system against unauthorized accesses. Any error in the implementation of such policies may lead to undesirable outcomes. For testing the implementation of access control policies, it is preferred to use automated methods which are faster and more relia...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013