%0 Conference Proceedings %T A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC %+ Institute for Cyber Security (University of Texas at San Antonio) (ICS) %A Jin, Xin %A Krishnan, Ram %A Sandhu, Ravi %Z Part 2: Access Control %< avec comité de lecture %( Lecture Notes in Computer Science %B 26th Conference on Data and Applications Security and Privacy (DBSec) %C Paris, France %Y Nora Cuppens-Boulahia %Y Frédéric Cuppens %Y Joaquin Garcia-Alfaro %I Springer %3 Data and Applications Security and Privacy XXVI %V LNCS-7371 %P 41-55 %8 2012-07-11 %D 2012 %R 10.1007/978-3-642-31540-4_4 %K Attribute %K XACML %K DAC %K MAC %K RBAC %K ABAC %Z Computer Science [cs]Conference papers %X Recently, there has been considerable interest in attribute based access control (ABAC) to overcome the limitations of the dominant access control models (i.e, discretionary-DAC, mandatory-MAC and role based-RBAC) while unifying their advantages. Although some proposals for ABAC have been published, and even implemented and standardized, there is no consensus on precisely what is meant by ABAC or the required features of ABAC. There is no widely accepted ABAC model as there are for DAC, MAC and RBAC. This paper takes a step towards this end by constructing an ABAC model that has “just sufficient” features to be “easily and naturally” configured to do DAC, MAC and RBAC. For this purpose we understand DAC to mean owner-controlled access control lists, MAC to mean lattice-based access control with tranquility and RBAC to mean flat and hierarchical RBAC. Our central contribution is to take a first cut at establishing formal connections between the three successful classical models and desired ABAC models. %G English %Z TC 11 %Z WG 11.3 %2 https://inria.hal.science/hal-01534757/document %2 https://inria.hal.science/hal-01534757/file/978-3-642-31540-4_4_Chapter.pdf %L hal-01534757 %U https://inria.hal.science/hal-01534757 %~ IFIP-LNCS %~ IFIP %~ IFIP-TC %~ IFIP-WG %~ IFIP-TC11 %~ IFIP-WG11-3 %~ IFIP-DBSEC %~ IFIP-LNCS-7371