Voir la notice de l'article provenant de la source Math-Net.Ru
@article{PDM_2019_2_a3, author = {M. N. Kalimoldayev and R. G. Biyashev and O. A. Rog}, title = {Analysis of the methods for~attribute-based~access~control}, journal = {Prikladna\^a diskretna\^a matematika}, pages = {43--57}, publisher = {mathdoc}, number = {2}, year = {2019}, language = {ru}, url = {http://geodesic.mathdoc.fr/item/PDM_2019_2_a3/} }
TY - JOUR AU - M. N. Kalimoldayev AU - R. G. Biyashev AU - O. A. Rog TI - Analysis of the methods for~attribute-based~access~control JO - Prikladnaâ diskretnaâ matematika PY - 2019 SP - 43 EP - 57 IS - 2 PB - mathdoc UR - http://geodesic.mathdoc.fr/item/PDM_2019_2_a3/ LA - ru ID - PDM_2019_2_a3 ER -
M. N. Kalimoldayev; R. G. Biyashev; O. A. Rog. Analysis of the methods for~attribute-based~access~control. Prikladnaâ diskretnaâ matematika, no. 2 (2019), pp. 43-57. http://geodesic.mathdoc.fr/item/PDM_2019_2_a3/
[1] Karp A., Haury H., Davis M., “From ABAC to ZBAC: The evolution of access control models”, ISSA J., 2010, no. 8, 22–30
[2] Sandhu R. S., Samarati P., “Access control: principle and practice”, IEEE Commun. Mag., 32:9 (1994), 40–48 | DOI
[3] Devyanin P. N., Models of security of computer systems, Textbook for students of higher educational institutions, Akademija Publ., M., 2005, 144 pp. (in Russian)
[4] Gaydamakin N. A., Differentiation of Access to Information in Computer Systems, USU Publ., Ekaterinburg, 2003, 328 pp. (in Russian)
[5] Hosmer H., “The multipolicy paradigm for trusted systems”, Proc. NSPW '92-93, ACM, N.Y., 1993, 19–32 | DOI
[6] Lang B. et al., “A flexible attribute based access control method for grid computing”, J. Grid Comput., 7:2 (2009), 169–180 | DOI
[7] Hu V. C., Ferraiolo D., Kuhn R., et al., Guide to Attribute Based Access Control (ABAC) Definition and Considerations, NIST Special Publication, 800-162, 2014 | DOI
[8] NCCOE. Attribute Based Access Control How-to Guides for Security Engineers, (Accessed November 25, 2015) https://nccoe.nist.gov/sites/default/files/nccoe/NIST_SP1800-3c_ABAC_0.pdf
[9] Servos D., Osborn S., “Current research and open problems in attribute-based access control”, ACM Computing Surveys, 49:4 (2017), 65 | DOI
[10] Jin X., Krishnan R., Sandhu R. S., “A unified attribute-based access control model covering DAC, MAC and RBAC”, LNCS, 7371, 2012, 41–55
[11] Servos D. and Osborn S., “HGABAC: Towards a formal model of hierarchical attribute-based access control”, Foundations and Practice of Security, Springer, 2014, 187–204
[12] Yuan E., Tong J., “Attributed based access control (ABAC) for web services”, Proc. ICWS'2005 (Washington, 2005), 561–569
[13] Biswas R., Sandhu R., Krishnan R., “Label-based access control: An ABAC model with enumerated authorization policy”, Proc. ABAC'16, ACM, N.Y., 2016, 1–12
[14] Biswas P., Sandhu R., Krishnan R. A., “A comparison of logical-formula and enumerated authorization policy ABAC models”, LNCS, 9766, 2016, 122–129
[15] Shen H., Hong F., “An attribute-based access control model for web services”, Proc. PDCAT'06, IEEE, 2006, 74–79
[16] Wang L., Wijesekera D., Jajodia S., “A logic-based framework for attribute based access control”, Proc. FMSE'04, ACM, 2004, 45–55
[17] Ferrailo D., Atluri V., Gavrila S., “The Policy Machine: A novel architecture and framework for access control policy specification and enforcement”, J. Systems Architecture, 57:4 (2011), 412–424 | DOI
[18] Kuijper W., Ermolaev V., “Sorting out role based access control”, Proc. 19th ACM SACMAT, ACM, 2014, 63–74
[19] Ferraiolo D., Chandramouli R., Hu V. C., Kuhn R. A., A Comparison of Attribute Based Access Control (ABAC) Standards for Data Service Applications, Extensible Access Control Markup Language (XACML) and Next Generation Access Control (NGAC), Natl. Inst. Stand. Technol. Spec. Publ. 800-178, 2016, 68 pp.
[20] Wakefield R., Policy Management in a Distributed Computing Environment, , 2008 http://www.cs.colostate.edu/w̃aker/papers/CS556_Policy_Management_in_Distributed_Computing.pdf
[21] Kalimoldayev M. N., Biyashev R. G., Rog O. A., “Formal representation of the functional model of a multi-criteria system of the access control to information resources”, Problemy Informatiki, 2014, no. 1(22), 43–55 (in Russian)
[22] Rog O. A., “Polymorphic typing of entities in the multi-criteria system of access control and a task of constructing types”, Inform. Technologies, Management and Society, 12th Intern. Scientific Conf. (Riga, April 16–17, 2014), 66
[23] Biyashev R. G., Kalimoldayev M. N., Rog O. A., “Polymorphic typing of entities and a task of constructing a mechanism for multi-criteria access control”, Izv. NAN RK, Ser. fiziko-matematicheskaja, 2014, no. 5, 33–41 (in Russian)
[24] Biyashev R. G., Kalimoldayev M. N., Rog O. A., “Designing of systems of multi-criteria attribute-based access control in cloud structures”, 11 Mezhdunar. Aziatskaja Shkola-seminar “Problemy optimizacii slozhnyh sistem” (Cholpon-Ata, 27 July–7 August, 2015), 148–152 (in Russian)
[25] Biyashev R. G., Kalimoldayev M. N., Rog O. A., “Logical approach to the organization of multi-criteria attribute-based access control”, Intern. Conf. “Computational and Informational Technologies in Science, Engineering and Education” (September 24–27, 2015), Kazak University, Almaty, 2015, 86 (in Russian)
[26] Biyashev R. G., Kalimoldayev M. N., Rog O. A., “Representation of the constraints of models of attribute-based access control”, Izv. NAN RK, Ser. fiziko-matematicheskaja, 2016, no. 1, 58–65 (in Russian)
[27] Biyashev R. G., Kalimoldayev M. N., Rog O. A., “Modeling of semantics of typed attribute-based access control”, Problemy Informatiki, 2017, no. 1, 25–37 (in Russian)
[28] Kalimoldayev M. N., Biyashev R. G., Rog O. A., “The use of logic for constructing models for the control of access to information”, Dokl. NAN RK, 2017, no. 3, 48–54 (in Russian)
[29] Kalimoldayev M. N., Biyashev R. G., Rog O. A., “Fundamentals of the architecture of software systems for the implementation of typed attribute-based access control”, Proc. “Sovremennye Problemy Informatiki i Vychislitel'nyh Tehnologij” (29–30 Juny 2017), Almaty, 2017, 88–95 (in Russian)
[30] Kalimoldayev M. N., Biyashev R. G., Rog O. A., “On the application of typed attribute-based access control in global computing environments”, Izv. Nauchno-Tehnicheskogo Obshhestva “KAHAK”, Almaty, 2017, no. 3(58), 30–36 (in Russian)