Attributes Enhanced Role-Based Access Control Model

Qasim Mahmood Rajpoot, Christian D. Jensen, Ram Krishnan

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

2890 Downloads (Pure)

Abstract

Attribute-based access control (ABAC) and role-based access control (RBAC) are currently the two most popular access control models. Yet, they both have known limitations and offer features com-
plimentary to each other. Due to this fact, integration of RBAC and ABAC has recently emerged as an important area of research. In this paper, we propose an access control model that combines the two models in a novel way in order to unify their benefits. Our approach provides a fine-grained access control mechanism that not only takes contextual information into account while making the access control decisions but is also suitable for applications where access to resources is controlled by exploiting contents of the resources in the policy.
Original languageEnglish
Title of host publicationProceedings of the 12th International Conference on Trust, Privacy and Security in Digital Business (TrustBus’15)
EditorsSimone Fischer-Huebner, Costas Lambrinoudakis
PublisherSpringer
Publication date2015
Pages3-17
ISBN (Print)978-3-319-22905-8
ISBN (Electronic)978-3-319-22906-5
DOIs
Publication statusPublished - 2015
Event12th International Conference on Trust, Privacy and Security in Digital Business (TrustBus’15) - Valencia, Spain
Duration: 1 Sept 20152 Sept 2015
Conference number: 12
http://www.ds.unipi.gr/trustbus15/

Conference

Conference12th International Conference on Trust, Privacy and Security in Digital Business (TrustBus’15)
Number12
Country/TerritorySpain
CityValencia
Period01/09/201502/09/2015
Internet address
SeriesLecture Notes in Computer Science
Volume9264
ISSN0302-9743

Keywords

  • Context-aware access control
  • RBAC
  • Attributes
  • Content-based access control
  • Role-permission explosion
  • Role-explosion

Fingerprint

Dive into the research topics of 'Attributes Enhanced Role-Based Access Control Model'. Together they form a unique fingerprint.

Cite this