2012 IEEE International Symposium on Policies for Distributed Systems and Networks 2012
DOI: 10.1109/policy.2012.15
|View full text |Cite
|
Sign up to set email alerts
|

On the Performance of Access Control Policy Evaluation

Abstract: Abstract-There is growing awareness of the need to protect digital resources and services in both corporate and home ICT scenarios. Meanwhile, communication tools tailored for corporations are blurring the line between communication mechanisms and (near) real-time resource sharing. The resulting requirement for near real-time policy-based access control is technically challenging. In a corporate domain, such access control mechanisms must be unobtrusive and comply with strict security objectives. Thus policy e… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
3
0
1

Year Published

2014
2014
2021
2021

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 17 publications
(4 citation statements)
references
References 12 publications
0
3
0
1
Order By: Relevance
“…Memiliki format data yang dapat dipertukarkan dengan struktur built-in data bahasa pemrograman mengurangi kompleksitas dan waktu pemrosesan. Selain itu [3], dasar dari XML juga hadir dalam JSON, jadi tidak ada yang secara signifikan dihilangkan [6].…”
Section: Implementasi Json Untuk Minimasi Penggunaan Jumlah Kolom Suatuunclassified
“…Memiliki format data yang dapat dipertukarkan dengan struktur built-in data bahasa pemrograman mengurangi kompleksitas dan waktu pemrosesan. Selain itu [3], dasar dari XML juga hadir dalam JSON, jadi tidak ada yang secara signifikan dihilangkan [6].…”
Section: Implementasi Json Untuk Minimasi Penggunaan Jumlah Kolom Suatuunclassified
“…JSON objects comprise of primarily two data structures: a collection of name-value pairs and an ordered list of values [7].Unlike XML JSON uses closed tags and its objects are analysed as strings instead of DOM which makes it easy to parse and generate codes written in JSON [8]. Moreover, [9] states clearly that all the features of XML are fulfilled by JSON [10].A simple example of JSON name value pair is demonstrated below- [8] JSON object structure.…”
Section: Jsonmentioning
confidence: 99%
“…These principles are the constraints for authorizing the system to make a decision. The XACML (eXtensible Access Control Markup Language) [3] is widely used in a distributed application system [4] in the SOA (Service-Oriented Architecture) [5] environment so that the security policy can be better expressed. The XACML is an open-standard language based on the XML and is used to standardize access control implemented in the XML (eXtensible Markup Language).…”
Section: Introductionmentioning
confidence: 99%