نتایج جستجو برای: xacml

تعداد نتایج: 771  

2012
Antonia Bertolino Said Daoudagh Francesca Lonetti Eda Marchetti

The specification of access control policies with the XACML language could be an error prone process, so a testing is usually the solution for increasing the confidence on the policy itself. In this paper, we compare two methodologies for deriving test cases for policy testing, i.e. XACML requests, that are implemented in the X-CREATE tool. We consider a simple combinatorial strategy and a XML-...

2005
C. Ardagna P. Samarati

In the last few years XML-based access control languages like XACML have been increasingly used for specifying complex policies regulating access to network resources. Today, growing interest in Semantic-Web style metadata for describing resources and users is stimulating research on how to express access control policies based on advanced descriptions rather than on single attributes. In this ...

2012
Juhan Kim Soohyung Kim Kiyoung Moon

In this paper, we design an integration security system that provides authentication service, authorization service, and management service of security data and a unified interface for the management service. The interface is originated from XKMS protocol and is used to manage security data such as XACML policies, SAML assertions and other authentication security data including public keys. The...

2005
Claudio Agostino Ardagna Ernesto Damiani Sabrina De Capitani di Vimercati Cristiano Fugazza Pierangela Samarati

In the last few years XML-based access control languages like XACML have been increasingly used for specifying complex policies regulating access to network resources. Today, growing interest in semanticWeb style metadata for describing resources and users is stimulating research on how to express access control policies based on advanced descriptions rather than on single attributes. In this p...

2007
Diala Abi Haidar Nora Cuppens-Boulahia Frederic Cuppens Herve Debar

Web services offer a possibility of exchanging data between entities from different organizational bounderies. Keeping sensitive resources private in a public world is a common concern of service providers. Thus, there is a need for access control management at the level of the web services in addition to a prior negotiation of access. This negotiation is the first step in the access control ma...

2011
Bart Van Brabant Joris Peeraer Wouter Joosen

System configuration tools automate the configuration and management of IT infrastructures. However these tools fail to provide decent authorisation on configuration input. In this paper we apply fine-grained authorisation of individual changes on a complex input language of an existing tool. We developed a prototype that extracts meaningful changes from the language used in the Puppet tool. Th...

2008
Ninghui Li Qihua Wang Prathima Rao Dan Lin Elisa Bertino Jorge Lobo

Many access control policy languages, e.g., XACML, allow a policy to contain multiple sub-policies, and the result of the policy on a request is determined by combining the results of the sub-policies according to some policy combining algorithms (PCAs). Existing access control policy languages, however, do not provide a formal language for specifying PCAs. As a result, it is difficult to exten...

2016
C. A. Ardagna S. De Capitani di Vimercati S. Paraboschi E. Pedrini P. Samarati Rodolfo Ferrini Elisa Bertino Kyu Il Kim Hyuk Jin Ko Won Gil Choi EunJu Lee Ung Mo Kim James B. D. Joshi R. Bhatti J. B. D. Joshi E. Bertino A. Ghafoor Shih-Chien Chou JeeHyun Hwang

Now a days web services have a greater role in development of software systems. Generally, web server wants to determine which access can be granted and communicate with requesterfor open web service environment. These systems are designed to be open and web servers does not have determined conditions for communicate to the access requester. Such consideration makes traditional access control n...

2004
Graham Hughes Tevfik Bultan

Managing access control policies in modern computer systems can be challenging and error-prone, especially when multiple access policies are combined to form new policies, possibly introducing unintended consequences. In this paper we present a framework for automated verification of access control policies. We introduce a formal model for systematically specifying access to resources. We show ...

Journal: :annals of telecommunications - annales des télécommunications 2008

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید