Download presentation
Presentation is loading. Please wait.
Published byAngelina Lane Modified over 6 years ago
1
Prosunjit Biswas UTSA prosun.csedu@gmail.com
A Prologue to Enumerated Authorization Policy ABAC Model. Prosunjit Biswas UTSA
2
Recap Attribute Example of attributes What is not an attribute?
3
Recap Attribute based policy
4
Recap Attribute Based Access Control (ABAC)
5
Why ABAC? Pseudo Identity Privacy “Beautiful lady at the bar” problem
6
Why ABAC? Establishment of the missing link
Eliminating human from the loop Assignment/de-assignment Users Roles Permissions Figure 1: RBAC Frequently changing mostly static Missing link Attributes User Attributes Policy Permissions mostly static mostly static Establishment of the missing link Figure 2: ABAC
7
Problem in the adaption of ABAC
Performance Large set of attributes Different attribute sources Unstructured policy References: [1]
8
LaBAC restricts ABAC Restrict number of attributes
Restrict policy structure ABAC LaBAC
9
Label-Based Access Control:
An ABAC Model with Enumerated Authorization Policy.
10
Terminologies Label Enumeration
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.