About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
The 8th IEEE International Workshop on Trusted Collaboration

Research Article

Supporting Secure Collaborations with Attribute-based Access Control

Download944 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.4108/icst.collaboratecom.2013.254168,
        author={Carlos Rubio-Medrano and Clinton D'Souza and Gail-Joon Ahn},
        title={Supporting Secure Collaborations with Attribute-based Access Control},
        proceedings={The 8th IEEE International Workshop on Trusted Collaboration},
        publisher={ICST},
        proceedings_a={TRUSTCOL},
        year={2013},
        month={11},
        keywords={attribute-based access control collaboration},
        doi={10.4108/icst.collaboratecom.2013.254168}
    }
    
  • Carlos Rubio-Medrano
    Clinton D'Souza
    Gail-Joon Ahn
    Year: 2013
    Supporting Secure Collaborations with Attribute-based Access Control
    TRUSTCOL
    ICST
    DOI: 10.4108/icst.collaboratecom.2013.254168
Carlos Rubio-Medrano1,*, Clinton D'Souza1, Gail-Joon Ahn1
  • 1: Arizona State University
*Contact email: crubiome@asu.edu

Abstract

Attribute-based access control (ABAC) has been regarded in recent years as an effective way for providing security guarantees in collaboration environments, due to its alleged flexibility and efficiency for meeting the access control requirements of heterogeneous organizations. Despite the growing interest in ABAC, there still need consensus on a reference model that comprehensively describes all necessary components and functions, in such a way non-trivial security properties can be effectively taken into account. In order to overcome this limitation, we propose an abstract model that includes a precise definition of attributes and relevant core components. In addition, we introduce the notion of security tokens that serve as a layer of association between attributes and access rights. We also validate our results by presenting both a case study and a comparison with existing approaches that have been previously proposed in the literature.

Keywords
attribute-based, access control, collaboration
Published
2013-11-12
Publisher
ICST
http://dx.doi.org/10.4108/icst.collaboratecom.2013.254168
Copyright © 2013–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL