2010
DOI: 10.1007/978-3-642-15152-1_14
|View full text |Cite
|
Sign up to set email alerts
|

Extending XACML Access Control Architecture for Allowing Preference-Based Authorisation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2014
2014
2016
2016

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 5 publications
0
3
0
Order By: Relevance
“…Kounga et. al [12] proposed an extended architecture for allowing users to define authorization policies based on their preferences to allow or deny access to their private data. Helil et.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Kounga et. al [12] proposed an extended architecture for allowing users to define authorization policies based on their preferences to allow or deny access to their private data. Helil et.…”
Section: Related Workmentioning
confidence: 99%
“…One reason for this, could be found in the fact that provenance data are stored in relational databases or RDF stores, with the access control left to the security mechanisms provided by these technologies. Security for database technologies has been extensively studied in the past (see [8] for an overview) and the increasing need for maintaining semantic resources has developed a large set of works focused on security for RDF data [9,10,11,12,13,14,15,16,17,18,19].…”
Section: Related Workmentioning
confidence: 99%
“…Specific policies for provenance data can be implemented either by using either a dedicated provenance access control language [54,55,56], or an existing standard such as OASIS eXtensible Access Control Markup Language (XACML). Since XACML is not generally suitable for RDF data [57,54,58,59,60], extensions to it are necessary [61,60].…”
Section: Securitymentioning
confidence: 99%