DOI

  • Sandro Etalle
  • Timothy L. Hinrichs
  • Adam J. Lee
  • Daniel Trivellato
  • Nicola Zannone

Tag-Based Authorization (TBA) is a hybrid access control model that combines the ease of use of extensional access control models with the expressivity of logic-based formalisms. The main limitation of TBA is that it lacks support for policy administration. More precisely, it does not allow policy-writers to specify administrative policies that constrain the tags that users can assign, and to verify the compliance of assigned tags with these policies. In this paper we introduce TBA2 (Tag-Based Authorization & Administration), an extension of TBA that enables policy administration in distributed systems. We show that TBA2 is more expressive than TBA and than two reference administrative models proposed in the literature, namely HRU and ARBAC97. © 2013 Springer-Verlag.

Original languageEnglish
Title of host publicationFoundations and Practice of Security - 5th International Symposium, FPS 2012, Revised Selected Papers
Pages162-179
Number of pages18
Volume7743 LNCS
DOIs
StatePublished - 2013
Event5th International Symposium on Foundations and Practice of Security, FPS 2012 - Montreal, QC, Canada

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7743 LNCS
ISSN (Print)03029743
ISSN (Electronic)16113349

Conference

Conference5th International Symposium on Foundations and Practice of Security, FPS 2012
CountryCanada
CityMontreal, QC
Period25/10/1226/10/12

    Research areas

  • access control, auditing, policy administration

ID: 32865427