Presentation is loading. Please wait.

Presentation is loading. Please wait.

A Prologue to Enumerated Authorization Policy ABAC Model.

Similar presentations


Presentation on theme: "A Prologue to Enumerated Authorization Policy ABAC Model."— Presentation transcript:

1 Prosunjit Biswas UTSA prosun.csedu@gmail.com
A Prologue to Enumerated Authorization Policy ABAC Model. Prosunjit Biswas UTSA

2 Recap Attribute Example of attributes What is not an attribute?

3 Recap Attribute based policy

4 Recap Attribute Based Access Control (ABAC)

5 Why ABAC? Pseudo Identity Privacy “Beautiful lady at the bar” problem

6 Why ABAC? Establishment of the missing link
Eliminating human from the loop Assignment/de-assignment Users Roles Permissions Figure 1: RBAC Frequently changing mostly static Missing link Attributes User Attributes Policy Permissions mostly static mostly static Establishment of the missing link Figure 2: ABAC

7 Problem in the adaption of ABAC
Performance Large set of attributes Different attribute sources Unstructured policy References: [1]

8 LaBAC restricts ABAC Restrict number of attributes
Restrict policy structure ABAC LaBAC

9 Label-Based Access Control:
An ABAC Model with Enumerated Authorization Policy.

10 Terminologies Label Enumeration


Download ppt "A Prologue to Enumerated Authorization Policy ABAC Model."

Similar presentations


Ads by Google