The Imperative of Transitioning from Traditional Access Control to Modern Access Control | An Aus...

Channel:
Subscribers:
4,690
Published on ● Video Link: https://www.youtube.com/watch?v=11cx73slP-Y



Duration: 0:00
8 views
0


Guest: Ahmad Salehi Shahraki, Lecturer (Assistant Professor) in Cybersecurity, La Trobe University


On LinkedIn | https://www.linkedin.com/in/ahmad-salehi-shahraki-83494152/


Hosts: 


Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine (https://twitter.com/ITSPmagazine) ] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber (https://twitter.com/RedefiningCyber) ]


On ITSPmagazine | https://www.itspmagazine.com/sean-martin


Marco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine (https://twitter.com/ITSPmagazine) ] and Host of Redefining Society Podcast & Audio Signals Podcast


On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli


____________________________


Episode Notes


During this "On Location" podcast episode at AISA CyberCon 2024, host Sean Martin welcomed guest Ahmad Salehi Shahraki to discuss cutting-edge developments in access control, identity management, and cybersecurity infrastructure.


Ahmad, a lecturer at La Trobe University specializing in authentication, authorization, applied cryptography, and blockchain, shared insights into transitioning from traditional access control models like Role-Based Access Control (RBAC) to more advanced Attribute-Based Access Control (ABAC). Ahmad emphasized that while RBAC has served as the backbone of organizational security for decades, its centralized nature and limitations in cross-domain applications necessitate the shift to ABAC. He also highlighted a critical aspect of his research: leveraging cryptographic primitives like attribute-based group signatures to enhance security and privacy while enabling decentralization without relying on blockchain.


Sean and Ahmad explored the technical and operational implications of ABAC. Ahmad described how this model uses user attributes—such as location, role, and organizational details—to determine access permissions dynamically. This contrasts with RBAC's reliance on predefined roles, which can lead to rule exploitation and administrative inefficiencies.


Ahmad also discussed practical applications, including secure digital health systems, enterprise environments, and even e-voting platforms. One innovative feature of his approach is "attribute anonymity," which ensures sensitive information remains private, even in peer-to-peer or decentralized setups. For example, he described how his system could validate an individual’s age for accessing a service without revealing personal data—a critical step toward minimizing data exposure.


The conversation expanded into challenges organizations face in adopting ABAC, particularly the cost and complexity of transitioning from entrenched RBAC systems. Ahmad stressed the importance of education and collaboration with governments and industry players to operationalize ABAC and other decentralized models.


The episode closed with Ahmad reflecting on the robust feedback and collaboration opportunities he encountered at the conference, underscoring the growing interest in decentralized and privacy-preserving solutions within the cybersecurity industry. Ahmad’s research has attracted attention globally, with plans to further develop and implement these models in Australia and beyond.


Listeners are encouraged to follow Ahmad’s work and connect via LinkedIn to stay informed about these transformative approaches to cybersecurity.


____________________________


This Episode’s Sponsors


Threatlocker: https://itspm.ag/threatlocker-r974


____________________________


Resources


Learn more and catch more stories from Australian Cyber Conference 2024 coverage: https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia


Be sure to share and subscribe!


____________________________


Catch all of our event coverage: https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage


To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcast


To see and hear more Redefining Society stories on ITSPmagazine, visit:
https://www.itspmagazine.com/redefining-society-podcast


Want to tell your Brand Story Briefing as part of our event coverage?


Learn More 👉 https://itspm.ag/evtcovbrf




Other Videos By ITSPmagazine


2024-12-05Recap, Highlights and the importance of Human Connections in a Digital Connected Society
2024-12-05Securing Digital Legacies: Ethical Challenges and Insights Based on a True Story | Peter Gigengack
2024-12-05Becoming a Writer Later in Life: an Interview with Marco Ciappelli | After 40 Podcast with Dr. De...
2024-12-05Becoming a Writer Later in Life: an Interview with Marco Ciappelli | After 40 Podcast with Dr. De...
2024-12-05Becoming a Writer Later in Life: an Interview with Marco Ciappelli | After 40 Podcast
2024-12-04Beyond the Briefings: Exploring the Pulse of Cybersecurity Communities | A Black Hat Europe 2024 ...
2024-12-04Beyond the Briefings: Exploring the Pulse of Cybersecurity Communities | A Black Hat Europe 2024 ...
2024-12-04Beyond the Briefings: Exploring the Pulse of Cybersecurity Communities | A Black Hat Europe 2024 ...
2024-12-04Beyond the Briefings Exploring the Pulse of Cybersecurity Communities | Black Hat EU '24 Steve Wylie
2024-12-04From Melbourne to the World: Recap, Highlights and the importance of Human Connections in a Digit...
2024-12-03The Imperative of Transitioning from Traditional Access Control to Modern Access Control | An Aus...
2024-12-02The Coming Age of Astrobiology with Kenneth Goodis-Gordon | Stories From Space Podcast With Matth...
2024-12-02Building a Sustainable, Predictable Cyber Insurance Market | HITRUST | McGill and Partners Story
2024-12-02The Coming Age of Astrobiology with Kenneth Goodis-Gordon | Stories From Space Podcast With Matth...
2024-12-02Building a Sustainable, Predictable Cyber Insurance Market | 7 Minutes on ITSPmagazine From HITRU...
2024-12-02Building a Sustainable, Predictable Cyber Insurance Market | 7 Minutes on ITSPmagazine From HITRU...
2024-12-02Building a Sustainable, Predictable Cyber Insurance Market | 7 Minutes on ITSPmagazine From HITRU...
2024-12-02Building a Sustainable, Predictable Cyber Insurance Market | 7 Minutes on ITSPmagazine From HITRU...
2024-11-28Human Factors in Cyber Security: Cultivating Cybersecurity Culture and Cyber Skills Gap | An Aust...
2024-11-28Human Factors in Cyber Security: Cultivating Cybersecurity Culture & Cyber Skills Gap | AU Cyber Con
2024-11-28The Irreversible Impact of Technology: The Ethical Dilemmas We Face When We Can’t Uninvent Our Cr...