Graph Model Implementation of Attribute-Based Access Control Policies

09/21/2019
by   Hadi Ahmadi, et al.
0

Attribute-based access control (ABAC) promises a powerful way of formalizing access policies in support of a wide range of access management scenarios. Efficient implementation of ABAC in its general form is still a challenge, especially when addressing the complexity of privacy regulations and access management required to support the explosive growth of social and IoT networks. In this paper, we introduce a graph model implementation for expressing and evaluating access policies and illustrate a sample use-case implementation over Neo4 Graph Database. Graph databases excel at querying connected data and hence can evaluate complex policies efficiently via graph traversal algorithms.

READ FULL TEXT

page 9

page 11

page 15

research
10/31/2021

A Graphical Framework for the Category-Based Metamodel for Access Control and Obligations

We design a graph-based framework for the visualisation and analysis of ...
research
04/16/2020

Sieve: A Middleware Approach to Scalable Access Control for Database Management Systems

Current approaches of enforcing FGAC in Database Management Systems (DBM...
research
02/26/2019

NAC: Automating Access Control via Named Data

In this paper we present the design of Name-based Access Control (NAC) s...
research
12/19/2018

Using the decision support algorithms combining different security policies

During the development of the security subsystem of modern information s...
research
06/12/2023

Performance of Graph Database Management Systems as route planning solutions for different data and usage characteristics

Graph databases have grown in popularity in recent years as they are abl...
research
05/31/2023

Modelling the Performance of High Capacity Access Networks for the Benefit of End-Users and Public Policies

This paper deals with the challenge of modeling the performance of plann...
research
06/22/2023

XACML Extension for Graphs: Flexible Authorization Policy Specification and Datastore-independent Enforcement

The increasing use of graph-structured data for business- and privacy-cr...

Please sign up or login with your details

Forgot password? Click here to reset