Distributed Access Control Management - A XACML-Based Approach

被引:0
作者
Rissanen, Erik [1 ]
Brossard, David
Slabbert, Adriaan [1 ]
机构
[1] Axiomatics AB, Electrum 223, S-16440 Kista, Sweden
来源
SERVICE-ORIENTED COMPUTING - ICSOC 2009, PROCEEDINGS | 2009年 / 5900卷
关键词
SOA; security; authorization; access control; XACML;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Enterprises are increasingly pervasive with users and services belonging to different domains. Cross-enterprise business collaborations are soaring and so are business relationships with complex access control rules. Business rules no longer come from a single source. There is a need for multiple administrators to define rules that apply to their part of the collaboration. Traditional access control models are not sufficient. This demonstrator illustrates an authorization service developed by Swedish SME Axiomatics. It implements the eXtended Access Control Markup Language (XACML), a policy- and rule-based access control language which allows the expression of fine-grained access control rules in distributed environments.
引用
收藏
页码:639 / +
页数:2
相关论文
共 50 条
  • [21] A Verified Algorithm for Detecting Conflicts in XACML Access Control Rules
    St-Martin, Michel
    Felty, Amy P.
    PROCEEDINGS OF THE 5TH ACM SIGPLAN CONFERENCE ON CERTIFIED PROGRAMS AND PROOFS (CPP'16), 2016, : 166 - 175
  • [22] Access control for agent-based computing: a distributed approach
    Antonopoulos, N
    Koukoumpetsos, K
    Shafarenko, A
    INTERNET RESEARCH-ELECTRONIC NETWORKING APPLICATIONS AND POLICY, 2001, 11 (01): : 55 - 64
  • [23] XML Access Control: Mapping XACML Policies to Relational Database Tables
    El-Aziz, Abd El-Aziz Ahmed Abd
    Kannanl, Arputharaj
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2014, 11 (06) : 532 - 539
  • [24] An Algorithm for Compression of XACML Access Control Policy Sets by Recursive Subsumption
    Stepien, Bernard
    Matwin, Stan
    Felty, Amy
    2012 SEVENTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2012, : 161 - 167
  • [25] Role-based access control for substation automation systems using XACML
    Lee, Byunghun
    Kim, Dae-Kyoo
    Yang, Hyosik
    Jang, Hyuksoo
    INFORMATION SYSTEMS, 2015, 53 : 237 - 249
  • [26] Attribute-Based Access Control for the Swarm With Distributed Policy Management
    Fedrecheski, Geovane
    Costa De Biase, Laisa Caroline
    Calcina-Ccori, Pablo C.
    Zuffo, Marcelo Knorich
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2019, 65 (01) : 90 - 98
  • [27] Distributed management of permission for access control model
    Cai, Fangbo
    He, Jingsha
    Zardari, Zulfiqar Ali
    Han, Song
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2020, 38 (02) : 1539 - 1548
  • [28] A Non-Technical XACML Target Editor for Dynamic Access Control Systems
    Stepien, Bernard
    Felty, Amy
    Matwin, Stan
    PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON COLLABORATION TECHNOLOGIES AND SYSTEMS (CTS), 2014, : 150 - 157
  • [29] Generating XACML Enforcement Policies for Role-Based Access Control of XML Documents
    Algarin, Alberto De la Rosa
    Ziminski, Timoteus B.
    Demurjian, Steven A.
    Sanchez, Yaira K. Rivera
    Kuykendall, Robert
    WEB INFORMATION SYSTEMS AND TECHNOLOGIES, WEBIST 2013, 2014, 189 : 21 - 36
  • [30] Formal Approach for Authorization in Distributed Business Process Related Task Document Role Based Access Control
    Maroua, Nouioua
    Belhassen, Zouari
    Adel, Alti
    2019 15TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2019, : 1964 - 1970