Please use this identifier to cite or link to this item:
https://idr.l2.nitk.ac.in/jspui/handle/123456789/7222
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Singh, M.P. | |
dc.date.accessioned | 2020-03-30T09:58:39Z | - |
dc.date.available | 2020-03-30T09:58:39Z | - |
dc.date.issued | 2016 | |
dc.identifier.citation | 2016 14th Annual Conference on Privacy, Security and Trust, PST 2016, 2016, Vol., , pp.35-41 | en_US |
dc.identifier.uri | http://idr.nitk.ac.in/jspui/handle/123456789/7222 | - |
dc.description.abstract | Attribute-based access control (ABAC) is well known for flexible policy specification and dynamic decision-making capabilities. Unlike the other access control models, in ABAC, privileges are granted on the basis of the values (e.g., manager, deputy manager, secret, etc.) of the attributes (e.g., role, security level, etc.) of various entities (e.g., users, objects, environment, etc.). Therefore, it is imperative to associate the appropriate values of attributes to entities for ensuring proper access. Although ample amount of research has been done on ABAC, there is a lack of literature that addresses both constraints and the hierarchies of the values of the attributes of users and objects. This paper explores a family of ABAC models, which presents the multiple variations of ABAC, and also proposes a consolidated ABAC model, known as AHCSABAC, which specifies the hierarchies of the values of the attributes of users and various constraints on the values of the attributes of users. The usefulness of AHCSABAC model is then demonstrated. � 2016 IEEE. | en_US |
dc.title | AHCSABAC: Attribute value hierarchies and constraints specification in attribute-based access control | en_US |
dc.type | Book chapter | en_US |
Appears in Collections: | 2. Conference Papers |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.