Sciweavers

123 search results - page 12 / 25
» D-algebra for composing access control policy decisions
Sort
View
ICWS
2008
IEEE
13 years 9 months ago
A Theory of Role Composition
We study the access control integration problem for web services. Organizations frequently use many services, each with its own access control policies, that must interoperate whi...
Jeffrey Fischer, Rupak Majumdar
ICTAI
2009
IEEE
14 years 2 months ago
Managing Authorization Provenance: A Modal Logic Based Approach
Abstract—In distributed environments, access control decisions depend on statements of multiple agents rather than only one central trusted party. However, existing policy langua...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu
EUROPKI
2005
Springer
14 years 1 months ago
A Heterogeneous Network Access Service Based on PERMIS and SAML
Abstract The expansion of inter-organizational scenarios based on different authorization schemes involves the development of integration solutions allowing different authorizatio...
Gabriel López Millán, Óscar C...
ENTCS
2007
112views more  ENTCS 2007»
13 years 7 months ago
A Holistic Approach to Security Policies - Policy Distribution with XACML over COPS
The potentials of modern information technology can only be exploited, if the underlying infrastructure and the applied applications sufficiently take into account all aspects of ...
Jan Peters, Roland Rieke, Taufiq Rochaeli, Bjö...
SACMAT
2009
ACM
14 years 2 months ago
Supporting RBAC with XACML+OWL
XACML does not natively support RBAC and even the specialized XACML profiles are not able to support many relevant constraints such as static and dynamic separation of duty. Exte...
Rodolfo Ferrini, Elisa Bertino