2010 International Conference on Computer Application and System Modeling (ICCASM 2010) 2010
DOI: 10.1109/iccasm.2010.5622888
|View full text |Cite
|
Sign up to set email alerts
|

Extending XACML profile for RBAC with semantic concepts

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 3 publications
0
4
0
Order By: Relevance
“…It is well-known that XACML is very verbose and can become unreadable with few different polices [19,15]. It also, lacks a formal semantics for policy combination algorithms [4,18].…”
Section: Related Workmentioning
confidence: 98%
See 2 more Smart Citations
“…It is well-known that XACML is very verbose and can become unreadable with few different polices [19,15]. It also, lacks a formal semantics for policy combination algorithms [4,18].…”
Section: Related Workmentioning
confidence: 98%
“…Helil et. al [15], presented an extension of XACML profile for Role-based Access Control based on the semantic concepts. A OWL-DL reasoner is needed for evaluate the policy and a preliminary evaluation shown a low response time for the evaluation.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Specific policies for provenance data can be implemented either by using either a dedicated provenance access control language [54,55,56], or an existing standard such as OASIS eXtensible Access Control Markup Language (XACML). Since XACML is not generally suitable for RDF data [57,54,58,59,60], extensions to it are necessary [61,60].…”
Section: Securitymentioning
confidence: 99%