LinuxQuestions.org
Share your knowledge at the LQ Wiki.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 03-08-2014, 09:32 AM   #1
tronayne
Senior Member
 
Registered: Oct 2003
Location: Northeastern Michigan, where Carhartt is a Designer Label
Distribution: Slackware 32- & 64-bit Stable
Posts: 3,541

Rep: Reputation: 1065Reputation: 1065Reputation: 1065Reputation: 1065Reputation: 1065Reputation: 1065Reputation: 1065Reputation: 1065
Attribute Based Access Control (ABAC): NIST Guide Aims to Ease Access Control


The National Institute of Standards and Technology, NIST, has published a bulletin and guide to ABAC that may be of interest to administrators (see below for links to the bulletin and guide).

A news artice from BankInfoSecurity (http://www.bankinfosecurity.com/nist...control-a-6612) states:
Quote:
Attribute-based access control, or ABAC, is a logical access control methodology where authorization to perform a set of operations is determined by evaluating attributes associated with the subject, such as a user or employee; an object, such as specific computerized resource; and requested operations.

The flexibility of the ABAC model allows the greatest breadth of subjects to access the greatest breadth of objects without specifying individual relationships between each subject and each object, according to the NIST guidance.

"Access decisions can change between requests by simply changing attribute values, without the need to change the subject/object relationships defining underlying rule sets," says NIST Computer Scientist Vincent Hu, who co-wrote the guidance. "This provides a more dynamic access control management capability and limits long-term maintenance requirements of object protections."
The NIST Bulletin may be found at http://csrc.nist.gov/publications/ni...bul2014_03.pdf and the 46-page guide may be found at http://nvlpubs.nist.gov/nistpubs/spe...sp.800-162.pdf.

Interesting reading.

Hope this helps some.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Apache with MAC based access control tdbabar Linux - Enterprise 3 01-30-2012 10:51 AM
dovecot - ip based access control for a specific account ddaas Linux - Server 0 04-04-2011 02:56 AM
[SOLVED] user name based access control in squid. lasantha Linux - Server 3 10-26-2010 03:16 AM
Time quota based access control to specific websites jabngoolie Linux - Server 11 01-12-2010 06:43 PM
LXer: Role-based Access Control in SELinux LXer Syndicated Linux News 0 02-18-2008 09:50 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 09:28 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration