2016
DOI: 10.1007/978-981-287-990-5_7
|View full text |Cite
|
Sign up to set email alerts
|

Toward a New Extension of the Access Control Model ABAC for Cloud Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(6 citation statements)
references
References 9 publications
0
6
0
Order By: Relevance
“…Access control is "a security technique that regulates who or what can view or use resources in a computing environment" [19]. Different types of access control exist, including Identity-Based Access Control (IBAC), Role-Based Access Control (RBAC), and Attribute-Based Access Control (ABAC) [4]. While older, established blockchain technologies such as Bitcoin and Ethereum are nonpermissioned and therefore do not implement these types of access control systems, Hyperledger Fabric is a permissioned blockchain technology, which enforces it to perform access control.…”
Section: Secure Access Controlmentioning
confidence: 99%
“…Access control is "a security technique that regulates who or what can view or use resources in a computing environment" [19]. Different types of access control exist, including Identity-Based Access Control (IBAC), Role-Based Access Control (RBAC), and Attribute-Based Access Control (ABAC) [4]. While older, established blockchain technologies such as Bitcoin and Ethereum are nonpermissioned and therefore do not implement these types of access control systems, Hyperledger Fabric is a permissioned blockchain technology, which enforces it to perform access control.…”
Section: Secure Access Controlmentioning
confidence: 99%
“…Access control is "a security technique that regulates who or what can view or use resources in a computing environment" [19]. Different types of access control exist, including Identity-Based Access Control (IBAC), Role-Based Access Control (RBAC), and Attribute-Based Access Control (ABAC) [4]. While older, established blockchain technologies such as Bitcoin and Ethereum are non-permissioned and therefore do not implement these types of access control systems, Hyperledger Fabric is a permissioned blockchain technology, which enforces it to perform access control.…”
Section: Secure Access Controlmentioning
confidence: 99%
“…The most famous existing products for protecting shared resources include Discretionary Access Control (DAC) [15], Mandatory access control (MAC) [16], Role-based access control (RBAC) [17], Attribute-Based Access Control (ABAC) [18]. When examining available solutions, it has been found that ABAC is specifically tailored to the needs of cloud environment [9]. Another important aspect is that this model evaluates rules against the attributes of the entities (subject and object) through the use of security policy.…”
Section: A Proposed Approachmentioning
confidence: 99%