Enabling the deployment of ABAC policies in RBAC systems

Gunjan Batra, Vijayalakshmi Atluri, Jaideep Vaidya, Shamik Sural

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations


The flexibility, portability and identity-less access control features of Attribute Based Access Control (ABAC) make it an attractive choice to be employed in many application domains. However, commercially viable methods for implementation of ABAC do not exist while a vast majority of organizations use Role Based Access Control (RBAC) systems. In this paper, we present a way in which organizations having a RBAC system can deploy an ABAC policy. Thus, we propose a method for the translation of an ABAC policy into a form that can be adopted by an RBAC system. We compare the cost of enforcement in ABAC and RBAC with respect to time taken to evaluate an access request, and experimentally demonstrate that RBAC is significantly better in this respect. Since the cost of security management is more expensive under RBAC when compared to ABAC, we present an analysis of the different management costs and present mitigation approaches by considering various administrative operations.

Original languageEnglish (US)
Title of host publicationData and Applications Security and Privacy XXXII - 32nd Annual IFIP WG 11.3 Conference, DBSec 2018, Proceedings
EditorsStefano Paraboschi, Florian Kerschbaum
PublisherSpringer Verlag
Number of pages18
ISBN (Print)9783319957289
StatePublished - 2018
Event32nd Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy, DBSec 2018 - Bergamo, Italy
Duration: Jul 16 2018Jul 18 2018

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume10980 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


Other32nd Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy, DBSec 2018

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'Enabling the deployment of ABAC policies in RBAC systems'. Together they form a unique fingerprint.

Cite this