Poster: APETEEt -- Secure Enforcement of ABAC Policies using Trusted Execution Environment
Abstract
Supplemental Material
- Download
- 25.66 MB
References
Index Terms
- Poster: APETEEt -- Secure Enforcement of ABAC Policies using Trusted Execution Environment
Recommendations
A System for Centralized ABAC Policy Administration and Local ABAC Policy Decision and Enforcement in Host Systems using Access Control Lists
ABAC'18: Proceedings of the Third ACM Workshop on Attribute-Based Access ControlWe describe a method that centrally manages Attribute-Based Access Control (ABAC) policies and locally computes and enforces decisions regarding those policies for protection of resource repositories in host systems using their native Access Control ...
Deploying ABAC policies using RBAC systems
The flexibility, portability and identity-less access control features of Attribute Based Access Control (ABAC) make it an attractive choice to be employed in many application domains. However, commercially viable methods for implementation of ABAC do not ...
Contemporaneous Update and Enforcement of ABAC Policies
SACMAT '22: Proceedings of the 27th ACM on Symposium on Access Control Models and TechnologiesAccess control policies are dynamic in nature, and therefore require frequent updates to synchronize with the latest organizational security requirements. As these updates are handled, it is important that all user access requests be answered ...
Comments
Information & Contributors
Information
Published In
- General Chair:
- Silvio Ranise,
- Program Chairs:
- Roberto Carbone,
- Daniel Takabi
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Poster
Data Availability
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 112Total Downloads
- Downloads (Last 12 months)36
- Downloads (Last 6 weeks)4
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in