Policy administration in tag-based authorization

S. Etalle, T.L. Hinrichs, A.J. Lee, D. Trivellato, N. Zannone

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Citation (Scopus)
3 Downloads (Pure)

Abstract

Tag-Based Authorization (TBA) is a hybrid access control model that combines the ease of use of extensional access control models with the expressivity of logic-based formalisms. The main limitation of TBA is that it lacks support for policy administration. More precisely, it does not allow policy-writers to specify administrative policies that constrain the tags that users can assign, and to verify the compliance of assigned tags with these policies. In this paper we introduce TBA2 (Tag-Based Authorization & Administration), an extension of TBA that enables policy administration in distributed systems. We show that TBA2 is more expressive than TBA and than two reference administrative models proposed in the literature, namely HRU and ARBAC97.
Original languageEnglish
Title of host publicationFoundations and Practice of Security (5th International Symposium, FPS 2012, Montreal, QC, Canada, October 25-26, 2012, Revised Selected Papers)
EditorsJ. Garcia-Alfaro, F. Cuppens, N. Cuppens-Boulahia, A. Miri, N. Tawbi
Place of PublicationBerlin
PublisherSpringer
Pages162-179
ISBN (Print)978-3-642-37118-9
DOIs
Publication statusPublished - 2013
Eventconference; 5th International Symposium on Foundations and Practice of Security; 2012-10-25; 2012-10-26 -
Duration: 25 Oct 201226 Oct 2012

Publication series

NameLecture Notes in Computer Science
Volume7743
ISSN (Print)0302-9743

Conference

Conferenceconference; 5th International Symposium on Foundations and Practice of Security; 2012-10-25; 2012-10-26
Period25/10/1226/10/12
Other5th International Symposium on Foundations and Practice of Security

Fingerprint Dive into the research topics of 'Policy administration in tag-based authorization'. Together they form a unique fingerprint.

  • Cite this

    Etalle, S., Hinrichs, T. L., Lee, A. J., Trivellato, D., & Zannone, N. (2013). Policy administration in tag-based authorization. In J. Garcia-Alfaro, F. Cuppens, N. Cuppens-Boulahia, A. Miri, & N. Tawbi (Eds.), Foundations and Practice of Security (5th International Symposium, FPS 2012, Montreal, QC, Canada, October 25-26, 2012, Revised Selected Papers) (pp. 162-179). (Lecture Notes in Computer Science; Vol. 7743). Springer. https://doi.org/10.1007/978-3-642-37119-6_11