HoBAC: toward a Higher-order Attribute-Based Access Control Model

被引:6
作者
Aliane, Linda [1 ]
Adda, Mehdi [1 ]
机构
[1] Univ Quebec Rimouski, Dept Math Informat & Genie, Rimouski, PQ, Canada
来源
16TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2019),THE 14TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC-2019),THE 9TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY | 2019年 / 155卷
基金
加拿大自然科学与工程研究理事会;
关键词
IoT; Security; Access Control; ABAC; RBAC;
D O I
10.1016/j.procs.2019.08.044
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Ensuring security in dynamic environments such as the Internet of Things (IoT) is a prominent task and challenging at the same time. Attribute-Based Access Control (ABAC) is one of the most promising access control models and standards which has received meaningful attention in recent years. In this paper, we propose the theoretical foundations of an access control model, named order Attribute-Based Access Control (HoBAC), that is a generalization of ABAC. HoBAC extends the basic concepts of ABAC (subjects, objects and contexts) with aggregation operations that yields hierarchies. To show the effectiveness of HoBAC, two instances of the theoretical model are presented. (C) 2019 The Authors. Published by Elsevier B.V.
引用
收藏
页码:303 / 310
页数:8
相关论文
共 21 条
  • [1] Toward an Access Control Model for IOTCollab
    Adda, Mehdi
    Abdelaziz, Jabril
    Mcheick, Hamid
    Saad, Rabeb
    [J]. 6TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT-2015), THE 5TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2015), 2015, 52 : 428 - 435
  • [2] Access Control Models for Virtual Object Communication in Cloud-Enabled IoT
    Alshehri, Asma
    Sandhu, Ravi
    [J]. 2017 IEEE 18TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IEEE IRI 2017), 2017, : 16 - 25
  • [3] [Anonymous], 2003, IEEE 4th International Workshop on Policies for Distributed Systems and Networks, Proceedings, DOI DOI 10.1109/POLICY.2003.1206966
  • [4] Barkley J., 1997, P 2 ACM WORKSH ROL B, P127, DOI DOI 10.1145/266741.266769
  • [5] Bertino E., 2001, ACM Transactions on Information and Systems Security, V4, P191, DOI 10.1145/501978.501979
  • [6] RBAC-SC: Role-Based Access Control Using Smart Contract
    Cruz, Jason Paul
    Kaji, Yuichi
    Yanai, Naoto
    [J]. IEEE ACCESS, 2018, 6 : 12240 - 12251
  • [7] Dong YJ, 2018, INT C COMP SUPP COOP, P666, DOI 10.1109/CSCWD.2018.8465364
  • [8] Hu K., 2016, 2 INT C ADV MECH ENG, DOI [10.2991/ameii-16.2016.177, DOI 10.2991/AMEII-16.2016.177]
  • [9] Attribute-Based Access Control
    Hu, Vincent C.
    Kuhn, D. Richard
    Ferraiolo, David F.
    [J]. COMPUTER, 2015, 48 (02) : 85 - 88
  • [10] A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC
    Jin, Xin
    Krishnan, Ram
    Sandhu, Ravi
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXVI, 2012, 7371 : 41 - 55