Current research and open problems in attribute-based access control

D Servos, SL Osborn - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
Attribute-based access control (ABAC) is a promising alternative to traditional models of
access control (ie, discretionary access control (DAC), mandatory access control (MAC), and …

A unified attribute-based access control model covering DAC, MAC and RBAC

X **, R Krishnan, R Sandhu - Data and Applications Security and Privacy …, 2012 - Springer
Recently, there has been considerable interest in attribute based access control (ABAC) to
overcome the limitations of the dominant access control models (ie, discretionary-DAC …

Survey on delegated and self-contained authorization techniques in CPS and IoT

SV Sudarsan, O Schelén, U Bodin - IEEE Access, 2021 - ieeexplore.ieee.org
Authentication, authorization, and digital identity management are core features required by
secure digital systems. In this, authorization is a key component for regulating the detailed …

Abac-cc: Attribute-based access control and communication control for internet of things

S Bhatt, R Sandhu - Proceedings of the 25th ACM Symposium on Access …, 2020 - dl.acm.org
Internet of Things (IoT) is revolutionizing the capabilities of the Internet with billions of
connected devices in the cyberspace. These devices are commonly referred to as smart …

HGABAC: Towards a formal model of hierarchical attribute-based access control

D Servos, SL Osborn - Foundations and Practice of Security: 7th …, 2015 - Springer
Attribute-based access control (ABAC) is a promising alternative to traditional models of
access control (ie discretionary access control (DAC), mandatory access control (MAC) and …

Label-based access control: An ABAC model with enumerated authorization policy

P Biswas, R Sandhu, R Krishnan - Proceedings of the 2016 ACM …, 2016 - dl.acm.org
There are two major techniques for specifying authorization policies in Attribute Based
Access Control (ABAC) models. The more conventional approach is to define policies by …

A data classification method for inconsistency and incompleteness detection in access control policy sets

RA Shaikh, K Adi, L Logrippo - International Journal of Information …, 2017 - Springer
Access control policies may contain anomalies such as incompleteness and inconsistency,
which can result in security vulnerabilities. Detecting such anomalies in large sets of …

The Administrative Model for User and Group Attribute Assignment

M Gupta, R Sandhu - International Conference on Network and System …, 2016 - Springer
Several attribute-based access control (ABAC) models have been recently proposed to
provide finer-grained authorization and to address the shortcomings of existing models. In …

Mitigating Risks in the Cloud-Based Metaverse Access Control Strategies and Techniques

U Upadhyay, A Kumar, G Sharma, AK Saini… - International Journal of …, 2024 - igi-global.com
The advent of the metaverse has revolutionized virtual interactions and navigation,
introducing intricate access control challenges. This paper addresses the need for effective …

Secure access control for health information sharing systems

S Alshehri, RK Raj - 2013 IEEE international conference on …, 2013 - ieeexplore.ieee.org
The Health Information Technology for Economic and Clinical Health Act (HITECH) of 2009
encourages healthcare providers to share information to improve healthcare quality at …