2014 IEEE Workshop on Advanced Research and Technology in Industry Applications (WARTIA) 2014
DOI: 10.1109/wartia.2014.6976238
|View full text |Cite
|
Sign up to set email alerts
|

Attribute based access control constraint based on subject similarity

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(6 citation statements)
references
References 8 publications
0
6
0
Order By: Relevance
“…� d(ar j ))∧(op(ar i )∩op(ar j )! � ∅) then (10) for each ap inS ap i orO ap i of ar i do (11) for each ap' inS ap j orO ap j of ar j do (12) if (att(ap) � � att(ap'))∧(ap∩ap' � � ∅) then (13) continue; (14) else (15) CP�CP∪{(ar i , ar j )}; (16) calculate Prob(ar i , ar j ); (17) end if (18) end for (19) end for (20) end if (21) end for ALGORITHM 1: Novel method of conflict detection.…”
Section: Performance Evaluations For the Conflict Detectionsmentioning
confidence: 99%
See 1 more Smart Citation
“…� d(ar j ))∧(op(ar i )∩op(ar j )! � ∅) then (10) for each ap inS ap i orO ap i of ar i do (11) for each ap' inS ap j orO ap j of ar j do (12) if (att(ap) � � att(ap'))∧(ap∩ap' � � ∅) then (13) continue; (14) else (15) CP�CP∪{(ar i , ar j )}; (16) calculate Prob(ar i , ar j ); (17) end if (18) end for (19) end for (20) end if (21) end for ALGORITHM 1: Novel method of conflict detection.…”
Section: Performance Evaluations For the Conflict Detectionsmentioning
confidence: 99%
“…To address this problem while uniformly specifying various types of ABAC constraints, Bijon et al [20] proposed the attribute-based constraint specification language (ABCL). Based on the subject similarity, Helil and Rahman [21] used the ABAC constraint to check and determine the potential relationships between different entities. To further specify and verify the SoD constraints in ABAC systems, Jha et al [22] presented a novel approach for analyzing the complexity of enforcing the SOD constraints.…”
Section: Introductionmentioning
confidence: 99%
“…In this case, a mutual exclusion constraint over the values of these attribute, namely adjunct and full-time, has to be defined in order to satisfy the given policy. Numerous studies have researched how to specify and enforce such constraints in ABAC systems [2,3,7,11]. To the best of our knowledge, the proposal of Bijon et al is the most comprehensive work to date on constraint specifications in ABAC [2,3].…”
Section: Overview Of Constraints Specifications In Abacmentioning
confidence: 99%
“…There are quite a few research works on the formal specification of access control constraints [13,16,17,[21][22][23][24]. Crampton [16] analyzed and classified RBAC constraints in detail.…”
Section: Related Workmentioning
confidence: 99%
“…Crampton [16] analyzed and classified RBAC constraints in detail. In our previous works [13,24], we proposed general access control constraints against similar users' successive access to permissions from a sensitive combination of permissions. Joshi et al [21] presented the formal specification of RBAC constraints, therein considering time and location in access control decision-making.…”
Section: Related Workmentioning
confidence: 99%