An ontology-based approach to improve access policy administration of attribute-based access control

被引:0
|
作者
Li J. [1 ]
Zhang B. [1 ]
机构
[1] School of Electronic Information and Electric Engineering, Shanghai Key Laboratory of Integrated Administration, Technologies for Information Security, Shanghai Jiao Tong University, Shanghai
来源
International Journal of Information and Computer Security | 2019年 / 11卷 / 4-5期
基金
中国国家自然科学基金;
关键词
ABAC; access control; attribute-based access control; information security; ontology; OWL; policy administration; security policy; system security; web ontology language;
D O I
10.1504/IJICS.2019.101928
中图分类号
学科分类号
摘要
Attribute-based access control (ABAC) needs a large number of policies to function by using attributes of visitors, resources, environmental conditions, etc. Efficient policy administration is vital for implementation of ABAC models. In this paper, an ontology-based approach is proposed to build up an ABAC model, which is named as an ontology-based ABAC model, OABACM. Underlying relationships among things such as attributes hierarchies in OABACM are identified and described in OABACM, which if treated improperly can directly lead to problems in policy administration. In addition, policy representation and reasoning mechanism are discussed within OABACM and inherent logical properties of this model are formalised in rules. With proper reasoners, these properties can be utilised to logically improve access policy administration by reducing policy redundancy and detecting policy conflicts. In experiments, a sample ontology is created and several enterprise access examples are tested upon OABACM, which validates the effects of our model on policy administration. © 2019 Inderscience Enterprises Ltd.
引用
收藏
页码:391 / 412
页数:21
相关论文
共 50 条
  • [1] Attribute-Based Access Control
    Hu, Vincent C.
    Kuhn, D. Richard
    Ferraiolo, David F.
    COMPUTER, 2015, 48 (02) : 85 - 88
  • [2] On the Feasibility of Attribute-Based Access Control Policy Mining
    Chakraborty, Shuvra
    Sandhu, Ravi
    Krishnan, Ram
    2019 IEEE 20TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION FOR DATA SCIENCE (IRI 2019), 2019, : 245 - 252
  • [3] An Automatic Attribute-Based Access Control Policy Extraction From Access Logs
    Karimi, Leila
    Aldairi, Maryam
    Joshi, James
    Abdelhakim, Mai
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (04) : 2304 - 2317
  • [4] Attribute Expressions, Policy Tables and Attribute-Based Access Control
    Crampton, Jason
    Williams, Conrad
    PROCEEDINGS OF THE 22ND ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'17), 2017, : 79 - 90
  • [5] Attribute-Based Hierarchical Access Control With Extendable Policy
    Xiao, Meiyan
    Li, Hongbo
    Huang, Qiong
    Yu, Shui
    Susilo, Willy
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 1868 - 1883
  • [6] Towards Attribute-Based Access Control Policy Engineering Using Risk
    Krautsevich, Leanid
    Lazouski, Aliaksandr
    Martinelli, Fabio
    Yautsiukhin, Artsiom
    RISK ASSESSMENT AND RISK-DRIVEN TESTING, RISK 2013, 2014, 8418 : 80 - 90
  • [7] AARBAC: Attribute-Based Administration of Role-Based Access Control
    Ninglekhu, Jiwan L.
    Krishnan, Ram
    2017 IEEE 3RD INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC), 2017, : 126 - 135
  • [8] Attribute-Based Access Control Policy Review in Permissioned Blockchain
    Lawal, Sherifdeen
    Krishnan, Ram
    SECURE KNOWLEDGE MANAGEMENT IN THE ARTIFICIAL INTELLIGENCE ERA, 2022, 1549 : 97 - 109
  • [9] Attribute-Based Access Control for the Swarm With Distributed Policy Management
    Fedrecheski, Geovane
    Costa De Biase, Laisa Caroline
    Calcina-Ccori, Pablo C.
    Zuffo, Marcelo Knorich
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2019, 65 (01) : 90 - 98
  • [10] Attribute-Based Oblivious Access Control
    Han, Jinguang
    Susilo, Willy
    Mu, Yi
    Yan, Jun
    COMPUTER JOURNAL, 2012, 55 (10) : 1202 - 1215