Current research and open problems in attribute-based access control

D Servos, SL Osborn - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
Attribute-based access control (ABAC) is a promising alternative to traditional models of
access control (ie, discretionary access control (DAC), mandatory access control (MAC), and …

A survey on empirical security analysis of access-control systems: a real-world perspective

S Parkinson, S Khan - ACM Computing Surveys, 2022 - dl.acm.org
There any many different access-control systems, yet a commonality is that they provide
flexible mechanisms to enforce different access levels. Their importance in organisations to …

Towards formal verification of role-based access control policies

S Jha, N Li, M Tripunitara, Q Wang… - IEEE Transactions on …, 2008 - ieeexplore.ieee.org
Specifying and managing access control policies is a challenging problem. We propose to
develop formal verification techniques for access control policies to improve the current state …

An access control model for resource sharing based on the role-based access control intended for multi-domain manufacturing internet of things

Q Liu, H Zhang, J Wan, X Chen - IEEE access, 2017 - ieeexplore.ieee.org
Manufacturing Internet of Things (MIoT) represents the manufacturing oriented to Internet of
Things with two important characteristics, resource sharing and process collaboration …

Efficient policy analysis for administrative role based access control

SD Stoller, P Yang, CR Ramakrishnan… - Proceedings of the 14th …, 2007 - dl.acm.org
Administrative RBAC (ARBAC) policies specify how Role-Based Access Control (RBAC)
policies may be changed by each administrator. It is often difficult to fully understand the …

Automatic error finding in access-control policies

K Jayaraman, V Ganesh, M Tripunitara… - Proceedings of the 18th …, 2011 - dl.acm.org
Verifying that access-control systems maintain desired security properties is recognized as
an important problem in security. Enterprise access-control systems have grown to protect …

Specification and verification of separation of duty constraints in attribute-based access control

S Jha, S Sural, V Atluri, J Vaidya - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Constraints form an important aspect of any access control system and are often regarded
as one of the principle motivations behind developing different access control models. The …

[图书][B] Attribute-based access control models and implementation in cloud infrastructure as a service

X Jin - 2014 - search.proquest.com
Recently, there has been considerable interest in attribute-based access control (ABAC) to
overcome the limitations of the classical access control models (ie, discretionary-DAC …

Reachability analysis for attributes in ABAC with group hierarchy

M Gupta, R Sandhu, T Mawla… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Attribute-based access control (ABAC) models are widely used to provide fine-grained and
adaptable authorization based on the attributes of users, resources, and other relevant …

Analysis of SEAndroid policies: Combining MAC and DAC in Android

H Chen, N Li, W Enck, Y Aafer, X Zhang - Proceedings of the 33rd …, 2017 - dl.acm.org
Android has become a dominant computing platform, and its popularity has coincided with a
surge of malware. The incorporation of Security-Enhanced Linux in Android (SEAndroid) is …