TY - GEN
T1 - Enabling the deployment of ABAC policies in RBAC systems
AU - Batra, Gunjan
AU - Atluri, Vijayalakshmi
AU - Vaidya, Jaideep
AU - Sural, Shamik
N1 - Funding Information:
Acknowledgments. Research reported in this publication was supported by the National Institutes of Health under award R01GM118574, by the National Science Foundation under awards CNS-1564034 and CNS-1624503 and by the National Academies of Sciences, Engineering, and Medicine under the PAK-US Science and Technology Cooperation Program. The content is solely the responsibility of the authors and does not necessarily represent the official views of the agencies funding the research. We would also like to thank Dr. Emre Uzun for his comments.
Funding Information:
Research reported in this publication was supported by the National Institutes of Health under award R01GM118574, by the National Science Foundation under awards CNS-1564034 and CNS-1624503 and by the National Academies of Sciences, Engineering, and Medicine under the PAK-US Science and Technology Cooperation Program. The content is solely the responsibility of the authors and does not necessarily represent the official views of the agencies funding the research. We would also like to thank Dr. Emre Uzun for his comments.
Publisher Copyright:
© IFIP International Federation for Information Processing 2018.
PY - 2018
Y1 - 2018
N2 - The flexibility, portability and identity-less access control features of Attribute Based Access Control (ABAC) make it an attractive choice to be employed in many application domains. However, commercially viable methods for implementation of ABAC do not exist while a vast majority of organizations use Role Based Access Control (RBAC) systems. In this paper, we present a way in which organizations having a RBAC system can deploy an ABAC policy. Thus, we propose a method for the translation of an ABAC policy into a form that can be adopted by an RBAC system. We compare the cost of enforcement in ABAC and RBAC with respect to time taken to evaluate an access request, and experimentally demonstrate that RBAC is significantly better in this respect. Since the cost of security management is more expensive under RBAC when compared to ABAC, we present an analysis of the different management costs and present mitigation approaches by considering various administrative operations.
AB - The flexibility, portability and identity-less access control features of Attribute Based Access Control (ABAC) make it an attractive choice to be employed in many application domains. However, commercially viable methods for implementation of ABAC do not exist while a vast majority of organizations use Role Based Access Control (RBAC) systems. In this paper, we present a way in which organizations having a RBAC system can deploy an ABAC policy. Thus, we propose a method for the translation of an ABAC policy into a form that can be adopted by an RBAC system. We compare the cost of enforcement in ABAC and RBAC with respect to time taken to evaluate an access request, and experimentally demonstrate that RBAC is significantly better in this respect. Since the cost of security management is more expensive under RBAC when compared to ABAC, we present an analysis of the different management costs and present mitigation approaches by considering various administrative operations.
UR - http://www.scopus.com/inward/record.url?scp=85050527252&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85050527252&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-95729-6_4
DO - 10.1007/978-3-319-95729-6_4
M3 - Conference contribution
AN - SCOPUS:85050527252
SN - 9783319957289
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 51
EP - 68
BT - Data and Applications Security and Privacy XXXII - 32nd Annual IFIP WG 11.3 Conference, DBSec 2018, Proceedings
A2 - Paraboschi, Stefano
A2 - Kerschbaum, Florian
PB - Springer Verlag
T2 - 32nd Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy, DBSec 2018
Y2 - 16 July 2018 through 18 July 2018
ER -