Uneingeschränkter Zugang

Hybrid Role and Attribute Based Access Control Applied in Information Systems

   | 07. Dez. 2021

Zitieren

1.Kuhn, D. R., E. J. Coyne, T. R. Weil. Adding Attributes to Role-Based Access Control – IEEE Computer, Vol. 43, 2010, No 6, pp. 79-81.10.1109/MC.2010.155 Search in Google Scholar

2. Ferraiolo, D. F., D. R. Kuhn, R. Chandramouli. Role-Based Access Control. Second Edition. Artech House, 2007. Search in Google Scholar

3. Ferraiolo, D. F., R. Sandhu, S. Gavrila, D. R. Kuhn, R. Chandramouli. Proposed NIST Standard for Role-Based Access Control. ACM Transactions on Information and System Security, Vol. 4, August 2001, No 3, pp. 224-274.10.1145/501978.501980 Search in Google Scholar

4. Sandhu, R., E. Coyne, H. Feinstein, C. Youman. Role-Based Access Control Models IEEE Computer, Vol. 29, February 1996, No 2, pp. 38-47.10.1109/2.485845 Search in Google Scholar

5. Hu, V. C., D. Ferrariolo, R. Kuhn, A. Schnitzer, K. Sandlin, R. Miller, S. Karen. Guide to Attribute Based Access Control (ABAC) Definitions and Considerations In: NIST Special Publication 800-162, SIN’13, 2014.10.6028/NIST.SP.800-162 Search in Google Scholar

6. Jin, X., R. Krishnan, R. Sandhu. A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC. – In: IFIP Annual Conference on Data and Applications Security and Privacy. Vol. 7371. Springer, 2012, pp. 41-55. Search in Google Scholar

7. Frederick, G., M. Daniel, S. Sandra, G. Carol. Information Technology Control and Audit. Auerbach Publications, 2004. Search in Google Scholar

8. Smith, R. E. Authentication From Passwords to Public Keys. Addison Wesley, 2002. Search in Google Scholar

9. Sandhu, R., P. Samarati. Authentication, Access Control, and Audit. – ACM Comput. Surv., Vol. 28, March 1996, No 1, pp. 241-243.10.1145/234313.234412 Search in Google Scholar

10. Schlegel, M., P. Amthor. Beyond Administration: A Modeling Scheme Supporting the Dynamic Analysis of Role-Based Access Control Policies. – In: Proc. of 17th International Joint Conference on e-Business and Telecommunications (ICETE’2020) – SECRYPT, 2020, pp. 431-442. ISBN: 978-989-758-446-6, ISSN 2184-7711, DOI: 10.5220/0009834304310442.10.5220/0009834304310442 Search in Google Scholar

11. Guclu, M., C. Bakir, V. Hakkoymaz. A New Scalable and Expandable Access Control Model for Distributed Database Systems in Data Security – In: Hindawi, Scientific Programming. Vol. 2020. 2020, Article ID 8875069. 10 p. https://doi.org/10.1155/2020/887506910.1155/2020/8875069 Search in Google Scholar

12. Chatterjee, A., Y. Pitroda, M. Parmar. Dynamic Role-Based Access Control for Decentralized Applications – In: Blockchain – ICBC 2020. Lecture Notes in Computer Science. Vol. 12404. Springer, Cham, 2020, pp. 185-197. DOI: 10.1007/978-3-030-59638-5_13.10.1007/978-3-030-59638-5_13 Search in Google Scholar

13. Abdalla, M., D. Catalano, R. Gay, B. Ursu. Inner-Product Functional Encryption with Fine-Grained Access Control. – In: S. Moriai, H. Wang, Eds. Advances in Cryptology – ASIACRYPT 2020. ASIACRYPT 2020. Lecture Notes in Computer Science. Vol. 12493. Cham., Springer, 2020, pp. 467-497. https://doi.org/10.1007/978-3-030-64840-4_1610.1007/978-3-030-64840-4_16 Search in Google Scholar

14. Ding, S., J. Cao, C. Li, K. Fan, H. Li. A Novel Attribute-Based Access Control Scheme Using Blockchain for IoT – In: IEEE Access, Vol. 7, 2019, pp. 38431-38441. DOI: 10.1109/ACCESS.2019.2905846.10.1109/ACCESS.2019.2905846 Search in Google Scholar

15. Sun, S., S. Chen, R. Du. Trusted and Efficient Cross-Domain Access Control System Based on Blockchain. – Scientific Programming, Vol. 2020, 2020, Article ID 8832568. 13 p. https://doi.org/10.1155/2020/883256810.1155/2020/8832568 Search in Google Scholar

16. Albulayhi, K., A. Abuhussein, F. Alsubaei, F. T. Sheldon. Fine-Grained Access Control in the Era of Cloud Computing: An Analytical Review. – In: 10th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 2020, pp. 748-755. DOI: 10.1109/CCWC47524.2020.9031179.10.1109/CCWC47524.2020.9031179 Search in Google Scholar

17. Li, H., L. Pei, D. Liao, S. Chen, M. Zhang, D. Xu. FADB: A Fine-Grained Access Control Scheme for VANET Data Based on Blockchain. – IEEE Access, Vol. 8, 2020, pp. 85190-85203. DOI: 10.1109/ACCESS.2020.2992203.10.1109/ACCESS.2020.2992203 Search in Google Scholar

18. Meneka, M., K. Meenakshisundaram. An Enhancement Role and Attribute Based Access Control Mechanism in Big Data. – International Journal of Electrical and Computer Engineering (IJECE), Vol. 8, 2018, No 5, pp. 3187-3193. ISSN: 2088-8708, DOI: 10.11591/ijece.v8i5pp3187-3193. Search in Google Scholar

19. Zigmonda, E., S. Chonga, C. Dimoulasb, S. Moorec. Fine-Grained Language-Based Access Control for Database-Backed Applications – The Art, Science, and Engineering of Programming, Vol. 4, 2020, No 2, Article 3. 30 p. DOI: 10.22152/programming-journal.org/2020/4/3.10.22152/programming-journal.org/2020/4/3 Search in Google Scholar

20. Ding, Y., H. Sato. Bloccess: Towards Fine-Grained Access Control Using Blockchain in a Distributed Untrustworthy Environment. – In: Proc. of 8th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud), Oxford, UK, 2020, pp. 17-22. DOI: 10.1109/MobileCloud48802.2020.00011.10.1109/MobileCloud48802.2020.00011 Search in Google Scholar

21. Liu, M., C. Yang, H. Li, Y. Zhang. An Efficient Attribute-Based Access Control (ABAC) Policy Retrieval Method Based on Attribute and Value Levels in Multimedia Networks. – In: Sensors 2020, Vol. 20, 2020, No 6, 1741. 15 p. https://doi.org/10.3390/s2006174110.3390/s20061741714746732245041 Search in Google Scholar

22. Shynu, P., K. Singh. A Comprehensive Survey and Analysis on Access Control Schemes in Cloud Environment. – Cybernetics and Information Technologies, Vol. 16, 2016, No 1, pp. 19-38.10.1515/cait-2016-0002 Search in Google Scholar

23. Tu, S., S. Niu, M. Li. An Efficient Access Control Scheme for Cloud Environment. – Cybernetics and Information Technologies, Vol. 13, 2013, No 3, pp. 77-90.10.2478/cait-2013-0027 Search in Google Scholar

24. Ekran Systems https://www.ekransystem.com/en/blog/rbac-vs-abac Search in Google Scholar

25. Penelov. Last Access Mart 2021. https://packagist.org/packages/laravelroles/rolespermissions Search in Google Scholar

26. PenelovLast Access Mart 2021. https://github.com/MGP-Ucict/mpenelova Search in Google Scholar

27. SpatiLast Access Mart 2021. https://github.com/spatie/laravel-permission Search in Google Scholar

28. SilbeLast Access Mart 2021. https://github.com/JosephSilber/bouncer Search in Google Scholar

29. KenedLast Access Mart 2021. https://github.com/jeremykenedy/laravel-roles Search in Google Scholar

eISSN:
1314-4081
Sprache:
Englisch
Zeitrahmen der Veröffentlichung:
4 Hefte pro Jahr
Fachgebiete der Zeitschrift:
Informatik, Informationstechnik