216
M. Polychronaki et al.
Fig. 4 Attribute-based access control system
rules are applied by the access control mechanism (ACM). The ACM is essentially
the point of the system where the decisions are made based on the policies configured
by access control rules.
However, both of these models are designed to work under specific scenarios,
thus producing disadvantages in some implementations [16]. For example, RBAC
was designed for the case of only one administrator for IAM and problems arise
when the administration is to be handled by multiple users. ABAC models heavily
depend on the fine-grained design of the policy’s architecture. This model cannot
be efficiently applied when there are cross-interfering attributes for subjects causing
errors in the access management functionality.
To solve the latter problem of the ABAC model, there have been efforts for
designing further mechanisms for attribute quality management [16]. This means that
subject and object attributes which are handled exclusively by the IAM system are
contextually analyzed and evaluated for preventing logical failures due to conflicting
attributes.
2.2
Responsibilities of IAM
The obligation of any IAM system is two-fold with the first to be identity management
and the second is access management [8]. The first one is about all the processes
which have an effect on the digital equivalent of an entity, which is its identity. Thus,
identity management includes but is not limited to services for:
• Creation of an entity’s identity
• Assignment of attributes to identities
• Management of login credentials