نتایج جستجو برای: xacml

تعداد نتایج: 771  

Journal: :Applied sciences 2023

In cloud computing, dynamic storage of data generated by users, applications, tasks, workflows, etc. requires frequent access operations, so traditional encryption cannot be applied in this case. Considering the vulnerability data, its protection needs to consider an efficient and security scheme. data-oriented control, approach is generally static policy matching, which deal with emergencies h...

1998
A. Molina M. Flóres D. Caballero

Latin American economy is growing fast and national enterprises are looking for new ways of improving their competitive position against international firms, specially Small and Medium Enterprises. The concept of Virtual Enterprises can be a new way to do business and exploit business opportunities for these companies. In this report we will discuss the Framework for Virtual Enterprises develop...

2012
Muhammad Sabir Idrees Yves Roudier

The configuration of security mechanisms in automotive onboard networks makes it necessary to define and deploy adapted security policies. This paper discusses how to design policy engines that implement an effective enforcement in such architectures despite the complexity of the protocol stacks of on-board electronic control units. It also evaluates how policies expressed in XACML can be adapt...

2015
Jason Crampton Charles Morisset Nicola Zannone

Attribute Based Access Control (ABAC) is becoming the reference model for the specification and evaluation of access control policies. In ABAC policies and access requests are defined in terms of pairs attribute names/values. The applicability of an ABAC policy to a request is determined by matching the attributes in the request with the attributes in the policy. Some languages supporting ABAC,...

Journal: :Computers & Security 2011
Prathima Rao Dan Lin Elisa Bertino Ninghui Li Jorge Lobo

Collaborative and distributed applications, such as dynamic coalitions and virtualized grid computing, often require integrating access control policies of collaborating parties. Such an integration must be able to support complex authorization specifications and the finegrained integration requirements that the various parties may have. In this paper, we introduce an algebra for fine-grained i...

2015
Maarten Decat Jasper Moeys Bert Lagaisse Wouter Joosen

Access control is key to limiting the actions of users in an application and attribute-based policy languages such as XACML allow to express a wide range of access rules. As these policy languages become more widely used, policies grow both in size and complexity. Modularity and reuse are key to specifying and managing such policies effectively. Ideally, complex or domain-specific policy patter...

1992
Frank Leßke

We i n troduce an approach for the speciication of abstract data types based on temporal logic. To this end we propose a constructive speciication method. We present axiom schemes to get generally monomorphic and complete models. Non-constructive operations are deened as abbrevations for algorithms using construc-tors. We show that our approach i s a s e x p r e s s i v e as the classical metho...

2010
Kheira Bekara Yosra Ben Mustapha Maryline Laurent

Privacy in the digital world is a critical problem which is becoming even more imperious with the growth of the Internet, accompanied by the proliferation of e-services (e.g. ecommerce, e-health). One research track for efficient privacy management is to make use of user’s and service provider’s (SP) privacy policies, and to perform an automatic comparison in between to help any (skilled or uns...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید