Attribute based access control models
Prikladnaya Diskretnaya Matematika. Supplement, no. 5 (2012), pp. 79-82.

Voir la notice de l'article provenant de la source Math-Net.Ru

The paper presents reasons for necessity of more flexible access control systems, like attribute based access control (ABAC) system. General properties of ABAC are described. Several articles which discuss how ABAC principles may be combined with other access control models and how this models can be used are shown.
@article{PDMA_2012_5_a40,
     author = {D. V. Chernov},
     title = {Attribute based access control models},
     journal = {Prikladnaya Diskretnaya Matematika. Supplement},
     pages = {79--82},
     publisher = {mathdoc},
     number = {5},
     year = {2012},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/PDMA_2012_5_a40/}
}
TY  - JOUR
AU  - D. V. Chernov
TI  - Attribute based access control models
JO  - Prikladnaya Diskretnaya Matematika. Supplement
PY  - 2012
SP  - 79
EP  - 82
IS  - 5
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/PDMA_2012_5_a40/
LA  - ru
ID  - PDMA_2012_5_a40
ER  - 
%0 Journal Article
%A D. V. Chernov
%T Attribute based access control models
%J Prikladnaya Diskretnaya Matematika. Supplement
%D 2012
%P 79-82
%N 5
%I mathdoc
%U http://geodesic.mathdoc.fr/item/PDMA_2012_5_a40/
%G ru
%F PDMA_2012_5_a40
D. V. Chernov. Attribute based access control models. Prikladnaya Diskretnaya Matematika. Supplement, no. 5 (2012), pp. 79-82. http://geodesic.mathdoc.fr/item/PDMA_2012_5_a40/

[1] Bishop M., Introduction to Computer Security, Addison-Wesley, USA, 2005

[2] Yuan E., Tong J., “Attributed Based Access Control (ABAC) for Web Services”, Proc. IEEE Intern. Conf. on Web Services (ICWS' 05), Washington, DC, USA, 2005, 561–569

[3] Xinwen Z., Yingjiu L., Divya N., “An Attribute-Based Access Matrix Model”, Proc. ACM Symposium Appl. Computing (SAC' 05), Santa Fe, New Mexico, USA, March 2005, 359–363

[4] Al-Kahtani M. A., Sandhu R., “A model for attribute-based user-role assignment”, Annual Computer Security Appl. Conf., IEEE Computer Society, Las Vegas, NV, USA, 2002, 353–364

[5] Chunxiao Y., Zhongfu W., Yunqing F., “An Attribute-Based Delegation Model and Its Extension”, J. Res. Practice Inform. Technol., 38:1 (2006), 220–234

[6] Rakesh B., Omid F., Fariba K., et al., “Using Attribute-Based Access Control to Enable Attribute-Based Messaging”, Proc. 22nd Annual Computer Security Appl. Conf. (ACSAC' 06), Miami Beach, FL, USA, December 2006, 403–413

[7] Kuhn D. R., Coyne E. J., Weil T. R., “Adding attributes to role-based access control”, IEEE Computer, 43:6 (2010), 79–81 | DOI

[8] Devyanin P. N., Modeli bezopasnosti kompyuternykh sistem. Upravlenie dostupom i informatsionnymi potokami, ucheb. posobie dlya vuzov, Goryachaya liniya-Telekom, M., 2011, 320 pp.