A Survey on Access Control Deployment | SpringerLink
Skip to main content

A Survey on Access Control Deployment

  • Conference paper
Security Technology (SecTech 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 259))

Included in the following conference series:

Abstract

Access control is a security aspect whose requirements evolve with technology advances and, at the same time, contemporary social contexts. Multitudes of access control models grow out of their respective application domains such as healthcare and collaborative enterprises; and even then, further administering means, human factor considerations, and infringement management are required to effectively deploy the model in the particular usage environment. This paper presents a survey of access control mechanisms along with their deployment issues and solutions available today. We aim to give a comprehensive big picture as well as pragmatic deployment details to guide in understanding, setting up and enforcing access control in its real world application.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 5719
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 7149
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Barker, S.: Action-status access control. In: SACMAT, pp. 195–204 (2007)

    Google Scholar 

  2. Brucker, A.D., Brügger, L., Kearney, P., Wolff, B.: An approach to modular and testable security models of real-world health-care applications. In: SACMAT, pp. 133–142 (2011)

    Google Scholar 

  3. Brucker, A.D., Petritsch, H.: Extending access control models with break-glass. In: SACMAT, pp. 197–206 (2009)

    Google Scholar 

  4. Brunel, J., Cuppens, F., Cuppens, N., Sans, T., Bodeveix, J.P.: Security policy compliance with violation management. In: FMSE, pp. 31–40 (2007)

    Google Scholar 

  5. Cheng, P.C., Rohatgi, P., Keser, C., Karger, P.A., Wagner, G.M., Reninger, A.S.: Fuzzy multi-level security: An experiment on quantified risk-adaptive access control. In: 2007 IEEE Symp. on Security and Privacy, pp. 222–230 (2007)

    Google Scholar 

  6. Damiani, M.L., Bertino, E., Catania, B., Perlasca, P.: GEO-RBAC: A spatially aware RBAC. ACM Trans. Inf. Syst. Secur. 10 (2007)

    Google Scholar 

  7. Ferraiolo, D.F., Sandhu, R.S., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed NIST standard for role-based access control. ACM Trans. Inf. Syst. Secur. 4, 224–274 (2001)

    Article  Google Scholar 

  8. Frank, M., Buhmann, J.M., Basin, D.: On the definition of role mining. In: SACMAT, pp. 35–44 (2010)

    Google Scholar 

  9. Fu, C., Li, A., Xu, L.: Hierarchical and dynamic security access control for collaborative design in virtual enterprise. In: IEEE ICIME, pp. 723–726 (2010)

    Google Scholar 

  10. Hu, H., Ahn, G.J., Kulkarni, K.: Anomaly discovery and resolution in web access control policies. In: SACMAT, pp. 165–174 (2011)

    Google Scholar 

  11. Hu, V.C., Ferraiolo, D.F., Kuhn, D.R.: Assessment of access control systems. Tech. Rep. NIST Interagency Report 7316, NIST (September 2006)

    Google Scholar 

  12. Johnson, M.L., Bellovin, S.M., Reeder, R.W., Schechter, S.E.: Laissez-faire file sharing: access control designed for individuals at the endpoints. In: NSPW, pp. 1–10 (2009)

    Google Scholar 

  13. Ledru, Y., Qamar, N., Idani, A., Richier, J.L., Labiadh, M.A.: Validation of security policies by the animation of Z specifications. In: SACMAT, pp. 155–164 (2011)

    Google Scholar 

  14. Ma, J., Logrippo, L., Adi, K., Mankovski, S.: Risk analysis in access control systems based on trust theories. In: Proc. 2010 IEEE/WIC/ACM Int’l Conf. on Web Intelligence and Intelligent Agent Technology, vol. 3, pp. 415–418 (2010)

    Google Scholar 

  15. Marinovic, S., Craven, R., Ma, J., Dulay, N.: Rumpole: a flexible break-glass access control model. In: SACMAT, pp. 73–82 (2011)

    Google Scholar 

  16. Massacci, F.: Infringo ergo sum: when will software engineering support infringements? In: FoSER, pp. 233–238 (2010)

    Google Scholar 

  17. Molloy, I., Li, N., Li, T., Mao, Z., Wang, Q., Lobo, J.: Evaluating role mining algorithms. In: SACMAT, pp. 95–104 (2009)

    Google Scholar 

  18. Nguyen, N.D., Le, X.H., Zhung, Y., Lee, S., Lee, Y.K., Lee, H.: Enforcing access control using risk assessment. In: Proc. 4th European Conf. on Universal Multiservice Networks, pp. 419–424 (2007)

    Google Scholar 

  19. Ni, Q., Bertino, E.: xfACL: an extensible functional language for access control. In: SACMAT, pp. 61–72 (2011)

    Google Scholar 

  20. Ni, Q., Bertino, E., Lobo, J.: Risk-based access control systems built on fuzzy inferences. In: ASIACCS, pp. 250–260 (2010)

    Google Scholar 

  21. OASIS: eXtensible Access Control Markup Language (XACML) Version 3.0. Committee specification 01, OASIS (August 2010), http://docs.oasis-open.org/xacml/3.0/xacml-3.0-core-spec-cs-01-en.pdf

  22. Ouyang, K., Joshi, J.B.D.: CT-RBAC: A temporal RBAC model with conditional periodic time. In: IPCCC, pp. 467–474 (2007)

    Google Scholar 

  23. Park, J., Sandhu, R.S.: The UCON ABC usage control model. ACM Trans. Inf. Syst. Secur. 7, 128–174 (2004)

    Article  Google Scholar 

  24. Rescorla, E., Lebovitz, G.: A survey of authentication mechanisms version 7. Internet-draft, Internet Engineering Task Force (February 2010), http://tools.ietf.org/search/draft-iab-auth-mech-07

  25. Salim, F., Reid, J., Dawson, E.: An administrative model for UCON ABC . In: Proc. 8th Australasian Conf. on Information Security, vol. 105, pp. 32–38. Australian Computer Society, Inc., Darlinghurst (2010)

    Google Scholar 

  26. Salim, F., Reid, J., Dawson, E.: Authorization models for secure information sharing: A survey and research agenda. ISeCure, The ISC Int’l Journal of Information Security 2(2), 69–87 (2010)

    Google Scholar 

  27. Samarati, P., di Vimercati, S.d.C.: Access control: Policies, models, and mechanisms. In: Focardi, R., Gorrieri, R. (eds.) FOSAD 2000. LNCS, vol. 2171, pp. 137–196. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  28. Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. Computer 29(2), 38–47 (1996)

    Article  Google Scholar 

  29. Sandhu, R.S., Samarati, P.: Access control: Principles and practice. IEEE Communications Magazine 32, 40–48 (1994)

    Article  Google Scholar 

  30. Sinclair, S., Smith, S.W.: What’s wrong with access control in the real world? Security & Privacy 8(4), 74–77 (2010)

    Article  Google Scholar 

  31. Tripunitara, M.V., Carbunar, B.: Efficient access enforcement in distributed role-based access control (RBAC) deployments. In: SACMAT, pp. 155–164 (2009)

    Google Scholar 

  32. Vaidya, J., Atluri, V., Warner, J., Guo, Q.: Role engineering via prioritized subset enumeration. IEEE Trans. Dependable and Secure Computing 7(3), 300–314 (2010)

    Article  Google Scholar 

  33. Zhao, X., Johnson, M.E.: Access governance: Flexibility with escalation and audit. In: Proc. 43rd Hawaii Int’l Conf. on System Sciences, pp. 1–13 (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Suhendra, V. (2011). A Survey on Access Control Deployment. In: Kim, Th., Adeli, H., Fang, Wc., Villalba, J.G., Arnett, K.P., Khan, M.K. (eds) Security Technology. SecTech 2011. Communications in Computer and Information Science, vol 259. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27189-2_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-27189-2_2

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-27188-5

  • Online ISBN: 978-3-642-27189-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics