2008
DOI: 10.1002/cpe.v20:11
|View full text |Cite
|
Sign up to set email alerts
|

Untitled

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2008
2008
2018
2018

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 23 publications
(10 citation statements)
references
References 57 publications
0
10
0
Order By: Relevance
“…Third, while there is a large body of literature, e. g., [8,10,11], on improving the performance of security frameworks using caching strategies, only proactive caching [11,12] addresses the caching of dynamic access control properties. Still, proactive caching is only able to cache dynamic access control constraints if they are first-class citizens of the underlying access control language.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…Third, while there is a large body of literature, e. g., [8,10,11], on improving the performance of security frameworks using caching strategies, only proactive caching [11,12] addresses the caching of dynamic access control properties. Still, proactive caching is only able to cache dynamic access control constraints if they are first-class citizens of the underlying access control language.…”
Section: Discussionmentioning
confidence: 99%
“…As many widely used policy languages, e. g., [6,15], are not supporting such context requirements as first class citizens, they are usually encoded as access control constraints [7]. For example, XACML [15], PERMIS [6], or SecureUML [4] are supporting access control constraints.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Authentication [9], access control models, and authorisation infrastructures [7] provide critical security measures for enabling confidentiality, integrity, and availability to an organisation's resources. These rely on models, such as Role Based Access Control (RBAC) [26] and Attribute Based Access Control (ABAC) [19], in order to support large scale distributed systems.…”
Section: Insider Threatsmentioning
confidence: 99%
“…SAAF's objective is to monitor the usage of authorisation infrastructures, analysing subject interactions and adapt this infrastructure accordingly. SAAF was applied in the context of an authorisation system called PERMIS [7]. Since PERMIS has a particular architecture, SAAF design was specifically tailored to observe and control PERMIS.…”
Section: Introductionmentioning
confidence: 99%