An ontology-based approach to improve access policy administration of attribute-based access control

被引:0
|
作者
Li J. [1 ]
Zhang B. [1 ]
机构
[1] School of Electronic Information and Electric Engineering, Shanghai Key Laboratory of Integrated Administration, Technologies for Information Security, Shanghai Jiao Tong University, Shanghai
来源
International Journal of Information and Computer Security | 2019年 / 11卷 / 4-5期
基金
中国国家自然科学基金;
关键词
ABAC; access control; attribute-based access control; information security; ontology; OWL; policy administration; security policy; system security; web ontology language;
D O I
10.1504/IJICS.2019.101928
中图分类号
学科分类号
摘要
Attribute-based access control (ABAC) needs a large number of policies to function by using attributes of visitors, resources, environmental conditions, etc. Efficient policy administration is vital for implementation of ABAC models. In this paper, an ontology-based approach is proposed to build up an ABAC model, which is named as an ontology-based ABAC model, OABACM. Underlying relationships among things such as attributes hierarchies in OABACM are identified and described in OABACM, which if treated improperly can directly lead to problems in policy administration. In addition, policy representation and reasoning mechanism are discussed within OABACM and inherent logical properties of this model are formalised in rules. With proper reasoners, these properties can be utilised to logically improve access policy administration by reducing policy redundancy and detecting policy conflicts. In experiments, a sample ontology is created and several enterprise access examples are tested upon OABACM, which validates the effects of our model on policy administration. © 2019 Inderscience Enterprises Ltd.
引用
收藏
页码:391 / 412
页数:21
相关论文
共 50 条
  • [31] Classifying and Comparing Attribute-Based and Relationship-Based Access Control
    Ahmed, Tahmina
    Sandhu, Ravi
    Park, Jaehong
    PROCEEDINGS OF THE SEVENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'17), 2017, : 59 - 70
  • [32] Immediate attribute revocation in decentralized attribute-based access control
    Imine, Youcef
    Lounis, Ahmed
    Bouabdallah, Abdelmadjid
    2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 33 - 40
  • [33] Ontology-Based Delegation of Access Control: An Enhancement to the XACML Delegation Profile
    Daud, Malik Imran
    Sanchez, David
    Viejo, Alexandre
    TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, 2015, 9264 : 18 - 29
  • [34] An Efficient Verification Approach to Separation of Duty in Attribute-Based Access Control
    Yang, Benyuan
    Hu, Hesuan
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2024, 36 (09) : 4428 - 4442
  • [35] Efficiently Supporting Attribute-Based Access Control in Relational Databases
    Meena, Gaurav
    Paul, Proteet
    Sural, Shamik
    2023 5TH IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS, TPS-ISA, 2023, : 230 - 239
  • [36] Specification and Analysis of Attribute-Based Access Control Policies: An Overview
    Xu, Dianxiang
    Zhang, Yunpeng
    2014 IEEE EIGHTH INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY - COMPANION (SERE-C 2014), 2014, : 41 - 49
  • [37] POSTER: Enabling Attribute-Based Access Control in Linux Kernel
    Varshith, H. O. Sai
    Sural, Shamik
    Vaidya, Jaideep
    Atluri, Vijayalakshmi
    ASIA CCS'22: PROCEEDINGS OF THE 2022 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2022, : 1237 - 1239
  • [38] A Model Checking Based Approach for Verification of Attribute-Based Access Control Policies in Cloud Infrastructures
    Kotenko, Igor
    Saenko, Igor
    Levshun, Dmitry
    PROCEEDINGS OF THE FOURTH INTERNATIONAL SCIENTIFIC CONFERENCE INTELLIGENT INFORMATION TECHNOLOGIES FOR INDUSTRY (IITI'19), 2020, 1156 : 165 - 175
  • [39] A Coordinated Ciphertext Policy Attribute-based PHR Access Control with User Accountability
    Lin, Guofeng
    You, Lirong
    Hui, Bing
    Hong, Hanshu
    Su, Zhixin
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (04): : 1832 - 1853
  • [40] An Ontology-Based Approach to Dynamic Contextual Role for Pervasive Access Control
    Kayes, A. S. M.
    Rahayu, Wenny
    Dillon, Tharam
    PROCEEDINGS 2018 IEEE 32ND INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2018, : 601 - 608