Semantic Attribute-Based Access Control: A review on current status and future perspectives

被引:4
作者
Arshad, Hamed [1 ]
Johansen, Christian [2 ]
Owe, Olaf [1 ]
机构
[1] Univ Oslo, Oslo, Norway
[2] Norwegian Univ Sci & Technol, Trondheim, Norway
关键词
Access Control; Authorization; Semantic technologies; Attribute-Based Access Control; XACML; Semantic Attribute-Based Access Control; WEB; MANAGEMENT; LANGUAGE; SERVICES; MODEL; RESOURCES; FRAMEWORK;
D O I
10.1016/j.sysarc.2022.102625
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-based access control (ABAC) uses the attributes of the involved entities (i.e., subject, object, action, and environment) to provide access control. Despite various advantages offered by ABAC, it is not the best fit for distributed and heterogeneous environments where the attributes of an entity may not necessarily match (syntactically) those used in the access control policies. Therefore, another type of access control called Semantic Attribute-Based Access Control (SABAC) has emerged that takes into account the semantics of attributes by combining ABAC with semantic technologies. SABAC not only facilitates interoperability but also enhances the expressiveness of access control policies. Over the last decade, a number of research efforts have been conducted in developing semantic attribute-based access control schemes. However, there exists no survey paper on SABAC schemes, giving an overview of the existing approaches. Hence, this paper comprehensively reviews the conducted research efforts for developing SABAC. The main goal of this paper is to provide a comprehensive summary of the conducted research studies that is useful for researchers who want to enter and make contributions to this field. Furthermore, the paper identifies open problems and possible research entry points by demonstrating the advantages and disadvantages of the previous studies.
引用
收藏
页数:24
相关论文
共 101 条
[61]  
Kitchenham B.A., 2004, Joint Technical Report, Computer Science Department, Keele University and National ICT Australia Ltd, Keele
[62]   Systematic literature reviews in software engineering - A systematic literature review [J].
Kitchenham, Barbara ;
Brereton, O. Pearl ;
Budgen, David ;
Turner, Mark ;
Bailey, John ;
Linkman, Stephen .
INFORMATION AND SOFTWARE TECHNOLOGY, 2009, 51 (01) :7-15
[63]  
Kolter J, 2007, LECT NOTES COMPUT SC, V4602, P129
[64]  
Kolter J, 2007, INT FED INFO PROC, V232, P397
[65]   Usage control in computer security: A survey [J].
Lazouski, Aliaksandr ;
Martinelli, Fabio ;
Mori, Paolo .
COMPUTER SCIENCE REVIEW, 2010, 4 (02) :81-99
[66]  
Li NH, 2003, LECT NOTES COMPUT SC, V2562, P58
[67]   A fine-grained context-aware access control model for health care and life science linked data [J].
Liu, Zhengtao ;
Wang, Jiandong .
MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (22) :14263-14280
[68]   Semantic privacy-preserving framework for electronic health record linkage [J].
Lu, Yang ;
Sinnott, Richard O. .
TELEMATICS AND INFORMATICS, 2018, 35 (04) :737-752
[69]  
Manola F., 2004, W3C recommendation, V10, P6
[70]   Bringing semantics to web services with OWL-S [J].
Martin, David ;
Burstein, Mark ;
McDermott, Drew ;
McIlraith, Sheila ;
Paolucci, Massimo ;
Sycara, Katia ;
McGuinness, Deborah L. ;
Sirin, Evren ;
Srinivasan, Naveen .
WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2007, 10 (03) :243-277