Distributed Access Control Management - A XACML-Based Approach

被引:0
作者
Rissanen, Erik [1 ]
Brossard, David
Slabbert, Adriaan [1 ]
机构
[1] Axiomatics AB, Electrum 223, S-16440 Kista, Sweden
来源
SERVICE-ORIENTED COMPUTING - ICSOC 2009, PROCEEDINGS | 2009年 / 5900卷
关键词
SOA; security; authorization; access control; XACML;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Enterprises are increasingly pervasive with users and services belonging to different domains. Cross-enterprise business collaborations are soaring and so are business relationships with complex access control rules. Business rules no longer come from a single source. There is a need for multiple administrators to define rules that apply to their part of the collaboration. Traditional access control models are not sufficient. This demonstrator illustrates an authorization service developed by Swedish SME Axiomatics. It implements the eXtended Access Control Markup Language (XACML), a policy- and rule-based access control language which allows the expression of fine-grained access control rules in distributed environments.
引用
收藏
页码:639 / +
页数:2
相关论文
共 50 条
[21]   Distributed system for access control to physical resources based on qualifications [J].
Cristea, Daniela ;
Prostean, Octavian ;
Muschalik, Thomas ;
Tirian, Ovidiu .
SEPADS'10: PROCEEDINGS OF THE 9TH WSEAS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, PARALLEL AND DISTRIBUTED SYSTEMS, 2010, :201-+
[22]   A Verified Algorithm for Detecting Conflicts in XACML Access Control Rules [J].
St-Martin, Michel ;
Felty, Amy P. .
PROCEEDINGS OF THE 5TH ACM SIGPLAN CONFERENCE ON CERTIFIED PROGRAMS AND PROOFS (CPP'16), 2016, :166-175
[23]   Distributed access control for Grid environments using trust management approach [J].
Yin, G ;
Wang, HM ;
Liu, T ;
Shi, DX ;
Chen, MF .
PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS - ISPA 2005 WORKSHOPS, 2005, 3759 :485-495
[24]   Access control for agent-based computing: a distributed approach [J].
Antonopoulos, N ;
Koukoumpetsos, K ;
Shafarenko, A .
INTERNET RESEARCH-ELECTRONIC NETWORKING APPLICATIONS AND POLICY, 2001, 11 (01) :55-64
[25]   XML Access Control: Mapping XACML Policies to Relational Database Tables [J].
El-Aziz, Abd El-Aziz Ahmed Abd ;
Kannanl, Arputharaj .
INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2014, 11 (06) :532-539
[26]   An Algorithm for Compression of XACML Access Control Policy Sets by Recursive Subsumption [J].
Stepien, Bernard ;
Matwin, Stan ;
Felty, Amy .
2012 SEVENTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2012, :161-167
[27]   Role-based access control for substation automation systems using XACML [J].
Lee, Byunghun ;
Kim, Dae-Kyoo ;
Yang, Hyosik ;
Jang, Hyuksoo .
INFORMATION SYSTEMS, 2015, 53 :237-249
[28]   Attribute-Based Access Control for the Swarm With Distributed Policy Management [J].
Fedrecheski, Geovane ;
Costa De Biase, Laisa Caroline ;
Calcina-Ccori, Pablo C. ;
Zuffo, Marcelo Knorich .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2019, 65 (01) :90-98
[29]   Distributed management of permission for access control model [J].
Cai, Fangbo ;
He, Jingsha ;
Zardari, Zulfiqar Ali ;
Han, Song .
JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2020, 38 (02) :1539-1548
[30]   A Non-Technical XACML Target Editor for Dynamic Access Control Systems [J].
Stepien, Bernard ;
Felty, Amy ;
Matwin, Stan .
PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON COLLABORATION TECHNOLOGIES AND SYSTEMS (CTS), 2014, :150-157