Semantic Attribute-Based Access Control: A review on current status and future perspectives

被引:2
作者
Arshad, Hamed [1 ]
Johansen, Christian [2 ]
Owe, Olaf [1 ]
机构
[1] Univ Oslo, Oslo, Norway
[2] Norwegian Univ Sci & Technol, Trondheim, Norway
关键词
Access Control; Authorization; Semantic technologies; Attribute-Based Access Control; XACML; Semantic Attribute-Based Access Control; WEB; MANAGEMENT; LANGUAGE; SERVICES; MODEL; RESOURCES; FRAMEWORK;
D O I
10.1016/j.sysarc.2022.102625
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-based access control (ABAC) uses the attributes of the involved entities (i.e., subject, object, action, and environment) to provide access control. Despite various advantages offered by ABAC, it is not the best fit for distributed and heterogeneous environments where the attributes of an entity may not necessarily match (syntactically) those used in the access control policies. Therefore, another type of access control called Semantic Attribute-Based Access Control (SABAC) has emerged that takes into account the semantics of attributes by combining ABAC with semantic technologies. SABAC not only facilitates interoperability but also enhances the expressiveness of access control policies. Over the last decade, a number of research efforts have been conducted in developing semantic attribute-based access control schemes. However, there exists no survey paper on SABAC schemes, giving an overview of the existing approaches. Hence, this paper comprehensively reviews the conducted research efforts for developing SABAC. The main goal of this paper is to provide a comprehensive summary of the conducted research studies that is useful for researchers who want to enter and make contributions to this field. Furthermore, the paper identifies open problems and possible research entry points by demonstrating the advantages and disadvantages of the previous studies.
引用
收藏
页数:24
相关论文
共 100 条
  • [1] Multi-level authorisation model and framework for distributed semantic-aware environments
    Amini, M.
    Jalili, R.
    [J]. IET INFORMATION SECURITY, 2010, 4 (04) : 301 - 321
  • [2] Amini M., 2010, 2 LOGICAL LANGUAGE F
  • [3] Amini M, 2015, ISECURE-ISC INT J IN, V7, P27
  • [4] Anderson A., 2003, OASIS STAND
  • [5] [Anonymous], 2008, W3C RECOMMENDATION
  • [6] [Anonymous], 2017, SEM WEB, DOI DOI 10.3233/SW-160236
  • [7] Antoniou G., 2004, A Semantic Web Primer
  • [8] Ardagna C, 2005, LECT NOTES COMPUT SC, V3579, P363
  • [9] A privacy-aware access control system
    Ardagna, C.
    Cremonini, M.
    di Vimercati, S.
    Samarati, P.
    [J]. JOURNAL OF COMPUTER SECURITY, 2008, 16 (04) : 369 - 397
  • [10] Ardagna CA, 2005, LECT NOTES COMPUT SC, V3654, P16