2006 Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT'06) 2006
DOI: 10.1109/pdcat.2006.28
|View full text |Cite
|
Sign up to set email alerts
|

An Attribute-Based Access Control Model for Web Services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
32
0

Year Published

2009
2009
2023
2023

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 95 publications
(32 citation statements)
references
References 9 publications
0
32
0
Order By: Relevance
“…The determination of the attributes is performed according to the topics. As the attributes are related to the information entered, they can be grouped into the following three categories: subject attributes (such as personal information), Resource attributes (information about the outcomes), and environment attributes (information about the environment) [41]. In this manner, the complexities that are rising in the growing and complicated systems are solved.…”
Section: Attribute Based Access Controlmentioning
confidence: 99%
“…The determination of the attributes is performed according to the topics. As the attributes are related to the information entered, they can be grouped into the following three categories: subject attributes (such as personal information), Resource attributes (information about the outcomes), and environment attributes (information about the environment) [41]. In this manner, the complexities that are rising in the growing and complicated systems are solved.…”
Section: Attribute Based Access Controlmentioning
confidence: 99%
“…An authorized requester can invoke a web service only when it possesses the permissions to access the attributes. The model proposed in [11] allows requesters to use PMI (privilege management infrastructure) for managing the checking, retrieval, and revocation of authentication. The model also uses an RBAC-based web service access control policy to determine whether a requester can invoke a web service.…”
Section: Related Workmentioning
confidence: 99%
“…Our research focuses on preventing information leakage during the execution of net services. The prevention can be achieved by information flow control [2][3][4][5][6][7][8][9][10][11][12][13][14][15].…”
Section: Introductionmentioning
confidence: 99%
“…A broad range of access control models have been developed in the last decades, defining access control constraints based on particular security information such as the user's role (RBAC [8]) or the user's team affiliation (TBAC [9]). Since all these pieces of information can be considered as attributes of involved objects, the attribute-based access control model (ABAC) can be seen as the most comprehensive access control model, as described in [10]. Within the borders of one organisation, the organisational role of a subject is often the attribute of choice to perform access control, since it can be understood as "A set of expectations and behaviours associated with a given position in a social system."…”
Section: A Authentication Authorisation Trustmentioning
confidence: 99%