Proceedings of the 2008 Workshop on Testing, Analysis, and Verification of Web Services and Applications 2008
DOI: 10.1145/1390832.1390836
|View full text |Cite
|
Sign up to set email alerts
|

Policy expression and checking in XACML, WS-Policies, and the jABC

Abstract: Web-based access to sensitive and confidential data is realized today via different approaches, using a variety of methods to specify and combine access control policies. In an optic of change management and evolution, a structured and flexible model is needed to handle dynamicity, particularly when handling rights in systems with many users which hold different roles. Furthermore the validation of security constraints is an important key to warrant the reliability of control mechanisms.This paper compares the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Year Published

2010
2010
2019
2019

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
references
References 6 publications
(10 reference statements)
0
0
0
Order By: Relevance