Proceedings of the 38th Annual Hawaii International Conference on System Sciences
DOI: 10.1109/hicss.2005.300
|View full text |Cite
|
Sign up to set email alerts
|

How to Declare Access Control Policies for XML Structured Information Objects using OASIS' eXtensible Access Control Markup Language (XACML)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 118 publications
(11 citation statements)
references
References 1 publication
0
11
0
Order By: Relevance
“…However, having in mind their deficiencies [23], [24], [25] and the need for interoperable standards, both the research community and industry have been moving towards XML-based management protocols. The trend towards Web Services and XML/HTTP-based management has also affected PBM [129], [130], [178]. • Object: the general representation of data and methods.…”
Section: Distributed Policy Storage Provisioning and Enforcementmentioning
confidence: 99%
See 1 more Smart Citation
“…However, having in mind their deficiencies [23], [24], [25] and the need for interoperable standards, both the research community and industry have been moving towards XML-based management protocols. The trend towards Web Services and XML/HTTP-based management has also affected PBM [129], [130], [178]. • Object: the general representation of data and methods.…”
Section: Distributed Policy Storage Provisioning and Enforcementmentioning
confidence: 99%
“…These limitations should be considered in combination with the frequency of policy modifications [123], [124], [125], [126], [127]. On another perspective, XML-based solutions have also been considered as an alternative to LDAP for storing policies, in spite of XML's verbosity [128], [129], [130]. The reasons are the significant penetration of XML in several devices and systems and its wide support as a uniform and interoperable format for sharing and representing data.…”
Section: Policy Enforcement Issuesmentioning
confidence: 99%
“…In our implementation, as we use a WS-based architecture, messages exchanged (e.g., services) between A and B are XML files that obey SOAP protocols. Moreover, PolyOrBAC could be integrated perfectly into XACML architecture (Figure 8) [15,16].…”
Section: Ws Mechanisms In Polyorbacmentioning
confidence: 99%
“…The spatial data types are based on the Geographical Markup Language version 3 (GML3) [14]. These data types and functions can be used to define spatial constraints for XACML based policies [2], which means that it is possible to support declaration and enforcement of access restrictions on geographic information. GeoXACML defines mainly the geometry model for geometric data types in access rules and geometric functions that can operate on these geometric data types.…”
Section: Geoxacmlmentioning
confidence: 99%
“…The solution is based on existing profiles for RBAC [3], and the Geospatial eXtensible Access Control Markup Language (GeoXACML) for location based access control [2].…”
Section: Introductionmentioning
confidence: 99%