About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Security and Privacy in New Computing Environments. Third EAI International Conference, SPNCE 2020, Lyngby, Denmark, August 6-7, 2020, Proceedings

Research Article

A3BAC: Attribute-Based Access Control Model with Anonymous Access

Download(Requires a free EAI acccount)
3 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-030-66922-5_30,
        author={Runnan Zhang and Gang Liu and Shancang Li and Yongheng Wei and Quan Wang},
        title={A3BAC: Attribute-Based Access Control Model with Anonymous Access},
        proceedings={Security and Privacy in New Computing Environments. Third EAI International Conference, SPNCE 2020, Lyngby, Denmark, August 6-7, 2020, Proceedings},
        proceedings_a={SPNCE},
        year={2021},
        month={1},
        keywords={Access control ABAC Anonymous access HABS},
        doi={10.1007/978-3-030-66922-5_30}
    }
    
  • Runnan Zhang
    Gang Liu
    Shancang Li
    Yongheng Wei
    Quan Wang
    Year: 2021
    A3BAC: Attribute-Based Access Control Model with Anonymous Access
    SPNCE
    Springer
    DOI: 10.1007/978-3-030-66922-5_30
Runnan Zhang1, Gang Liu1,*, Shancang Li2, Yongheng Wei1, Quan Wang1
  • 1: School of Computer Science and Technology, Xidian University
  • 2: Department of Computer Science and Creative Technologies, University of the West of England
*Contact email: gliu_xd@163.com

Abstract

Researchers believe that anonymous access can protect private information even if it does not store in authorization organization. The current solution supports anonymous access by using a certificate instead of a subject identity or Attribute-Based Encryption. In a solution using a certificate, access may be linked to the certificate, which poses a risk of re-identification. The encryption of objects based on attributes limits the types of objects. The ABAC with anonymous access proposed in this paper called A3BAC inherits the features of the ABAC model, such as fine-grained authorization, policy flexibility, and unlimited object types. By combining HABS, it strengthens the identity-less of ABAC, so that the access does not involve a unique identification, reducing the risk of subject identity re-identification. It is a secure anonymous access framework.

Keywords
Access control ABAC Anonymous access HABS
Published
2021-01-22
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-030-66922-5_30
Copyright © 2020–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL