2019 15th International Conference on Semantics, Knowledge and Grids (SKG) 2019
DOI: 10.1109/skg49510.2019.00036
|View full text |Cite
|
Sign up to set email alerts
|

Negative Authorization by Implementing Negative Attributes in Attribute-Based Access Control Model for Internet of Medical Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 23 publications
0
4
0
Order By: Relevance
“…This implies that users are not explicitly granted authorizations but rather obtain them through their allocated profession function or responsibilities, meaning whether someone enters the business, switches offices, goes on leave, or leaves the company, their access rights are easy to handle and stay in charge. Instead of addressing user access rights at a granulated level, operator access rights are combined into several positions across different systems [31]. This means that you mechanically have one set (combination) of defined access rights if your effort in the Finance team, which is different from if you work in the marketing team.…”
Section: Materials and Proposed Methodsmentioning
confidence: 99%
“…This implies that users are not explicitly granted authorizations but rather obtain them through their allocated profession function or responsibilities, meaning whether someone enters the business, switches offices, goes on leave, or leaves the company, their access rights are easy to handle and stay in charge. Instead of addressing user access rights at a granulated level, operator access rights are combined into several positions across different systems [31]. This means that you mechanically have one set (combination) of defined access rights if your effort in the Finance team, which is different from if you work in the marketing team.…”
Section: Materials and Proposed Methodsmentioning
confidence: 99%
“…Access control is a technique to avoid unauthorized access to resources by illegal users while determining the adequate authority levels for authorized users [73,74]. In the case of IoMT systems, access control enables users to restrict access to IoMT devices by defining access levels for each user [5].…”
Section: Access Controlmentioning
confidence: 99%
“…In order to reconcile the respective problems of RBAC and ABAC, some researchers have tried to mix the two models. Aftab et al proposed a hybrid R-ABAC access control, which uses a combination of attribute values to generate roles, thus solving the problem of permission assignment present in ABAC and RBAC [33][34][35][36]. e flexibility of the ABAC model was also introduced in the RBAC model by adding the concept of negative authorization [37].…”
Section: Related Workmentioning
confidence: 99%
“…To enhance ABAC security by adding unique attribute values ABAC makes the overall model more difficult to manage as the number of attributes increases. Second, the large number of permission units generated by many attributes is difficult to track [33][34][35][36][37][38] Use the characteristics of RBAC privilege encapsulation to manage many attributes in ABAC, thus reconciling the disadvantages of each Many unordered attribute aggregation units can make the mixed access control model create the problem of role explosion. But, too little attribute aggregation units can create the problem of insufficient granularity of permissions in RBAC [39][40][41] Enhance the dynamics of various access control mechanisms using priority mechanisms.…”
Section: Permission Adjust Requirements In the Emergencies Of Thementioning
confidence: 99%