TY - GEN
T1 - Negative Authorization by Implementing Negative Attributes in Attribute-Based Access Control Model for Internet of Medical Things
AU - Aftab, M. U.
AU - Qin, Z.
AU - Hussain, K.
AU - Jamali, Z.
AU - Son, N. T.
AU - Nam, N. V.
AU - Dinh, T. V.
PY - 2020/3/23
Y1 - 2020/3/23
N2 - Access control plays an important role in protecting sensitive data of an organization, by employing a mechanism that grants or revokes access to the organizational resources. It is implemented with the help of different access control models either traditional or hybrid models. In this paper, we discuss DAC, MAC, RBAC and ABAC models briefly. In addition, we propose a hybrid model that is based on reverse authorization in ABAC model. The concept of negative attributes is implemented in ABAC model that directly restricts unauthorized users. Previously, several approaches to authorized users and their authority domain in ABAC model have been implemented in literature. Though, the proposed model is unique due to a different implementation of access control in the domain of Internet of Medical Things (IoMT). This work is also discussed with respect to an example scenario. In this way, the concept of negative attributes is elaborated for implementing the negative authorization in ABAC. The comparative analysis shows that this work can perform better in some scenarios by taking advantage of negative authorization.
AB - Access control plays an important role in protecting sensitive data of an organization, by employing a mechanism that grants or revokes access to the organizational resources. It is implemented with the help of different access control models either traditional or hybrid models. In this paper, we discuss DAC, MAC, RBAC and ABAC models briefly. In addition, we propose a hybrid model that is based on reverse authorization in ABAC model. The concept of negative attributes is implemented in ABAC model that directly restricts unauthorized users. Previously, several approaches to authorized users and their authority domain in ABAC model have been implemented in literature. Though, the proposed model is unique due to a different implementation of access control in the domain of Internet of Medical Things (IoMT). This work is also discussed with respect to an example scenario. In this way, the concept of negative attributes is elaborated for implementing the negative authorization in ABAC. The comparative analysis shows that this work can perform better in some scenarios by taking advantage of negative authorization.
U2 - 10.1109/SKG49510.2019.00036
DO - 10.1109/SKG49510.2019.00036
M3 - Conference contribution
SP - 167
EP - 174
BT - 2019 15th International Conference on Semantics, Knowledge and Grids (SKG)
PB - IEEE
ER -