{"title":"主题演讲#1:基于属性的访问控制:见解和挑战","authors":"R. Sandhu","doi":"10.1109/DESEC.2017.8073880","DOIUrl":null,"url":null,"abstract":"Since about 2010 there has been considerable growth of interest among cyber security researchers and practitioners in attribute-based access control (ABAC). The Institute of Cyber Security at the University of Texas at San Antonio has pursued this area intensively. This talk will present a personal perspective on the insights obtained by the Institute's research, as well as research from other groups working on this topic. The talk will identify some challenges in research as well as in practical deployments of ABAC.","PeriodicalId":92346,"journal":{"name":"DASC-PICom-DataCom-CyberSciTech 2017 : 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing ; 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing ; 2017 IEEE 3rd International...","volume":"3 1","pages":"34-34"},"PeriodicalIF":0.0000,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Keynote talk #1: Attribute-based access control: Insights and challenges\",\"authors\":\"R. Sandhu\",\"doi\":\"10.1109/DESEC.2017.8073880\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Since about 2010 there has been considerable growth of interest among cyber security researchers and practitioners in attribute-based access control (ABAC). The Institute of Cyber Security at the University of Texas at San Antonio has pursued this area intensively. This talk will present a personal perspective on the insights obtained by the Institute's research, as well as research from other groups working on this topic. The talk will identify some challenges in research as well as in practical deployments of ABAC.\",\"PeriodicalId\":92346,\"journal\":{\"name\":\"DASC-PICom-DataCom-CyberSciTech 2017 : 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing ; 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing ; 2017 IEEE 3rd International...\",\"volume\":\"3 1\",\"pages\":\"34-34\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"DASC-PICom-DataCom-CyberSciTech 2017 : 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing ; 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing ; 2017 IEEE 3rd International...\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/DESEC.2017.8073880\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"DASC-PICom-DataCom-CyberSciTech 2017 : 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing ; 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing ; 2017 IEEE 3rd International...","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/DESEC.2017.8073880","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Keynote talk #1: Attribute-based access control: Insights and challenges
Since about 2010 there has been considerable growth of interest among cyber security researchers and practitioners in attribute-based access control (ABAC). The Institute of Cyber Security at the University of Texas at San Antonio has pursued this area intensively. This talk will present a personal perspective on the insights obtained by the Institute's research, as well as research from other groups working on this topic. The talk will identify some challenges in research as well as in practical deployments of ABAC.