Distributed Access Control Management - A XACML-Based Approach

被引:0
作者
Rissanen, Erik [1 ]
Brossard, David
Slabbert, Adriaan [1 ]
机构
[1] Axiomatics AB, Electrum 223, S-16440 Kista, Sweden
来源
SERVICE-ORIENTED COMPUTING - ICSOC 2009, PROCEEDINGS | 2009年 / 5900卷
关键词
SOA; security; authorization; access control; XACML;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Enterprises are increasingly pervasive with users and services belonging to different domains. Cross-enterprise business collaborations are soaring and so are business relationships with complex access control rules. Business rules no longer come from a single source. There is a need for multiple administrators to define rules that apply to their part of the collaboration. Traditional access control models are not sufficient. This demonstrator illustrates an authorization service developed by Swedish SME Axiomatics. It implements the eXtended Access Control Markup Language (XACML), a policy- and rule-based access control language which allows the expression of fine-grained access control rules in distributed environments.
引用
收藏
页码:639 / +
页数:2
相关论文
共 50 条
[31]   Generating XACML Enforcement Policies for Role-Based Access Control of XML Documents [J].
Algarin, Alberto De la Rosa ;
Ziminski, Timoteus B. ;
Demurjian, Steven A. ;
Sanchez, Yaira K. Rivera ;
Kuykendall, Robert .
WEB INFORMATION SYSTEMS AND TECHNOLOGIES, WEBIST 2013, 2014, 189 :21-36
[32]   Policy Evaluation and Dynamic Management Based on Matching Tree for XACML [J].
Kang, Hongzhaoning ;
Gang, Liu ;
Wang, Quan ;
Zhang, Runnan ;
Zhong, Zichao ;
Tian, Yumin .
2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, :1530-1535
[33]   Formal Approach for Authorization in Distributed Business Process Related Task Document Role Based Access Control [J].
Maroua, Nouioua ;
Belhassen, Zouari ;
Adel, Alti .
2019 15TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2019, :1964-1970
[34]   Fine-Grained Access Control via XACML Policy Optimization in Cloud Computing [J].
Pei, Xin ;
Yu, Huiqun ;
Fan, Guisheng .
INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2015, 25 (9-10) :1709-1714
[35]   A network access control approach based on the AAA architecture and authorization attributes [J].
Lopez, Gabriel ;
Canovas, Oscar ;
Gomez, Antonio F. ;
Jimenez, Jesus D. ;
Marin, Rafael .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2007, 30 (03) :900-919
[36]   Distributed Access Control with Blockchain [J].
Paillisse, Jordi ;
Subira, Jordi ;
Lopez, Albert ;
Rodriguez-Natal, Alberto ;
Ermagan, Vina ;
Maino, Fabio ;
Cabellos, Albert .
ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2019,
[37]   Distributed Trust Based Access Control Architecture for Pervasive Computing [J].
Javeed, M. Younas ;
Nawaz, Sidra .
PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON UBIQUITOUS INFORMATION TECHNOLOGIES & APPLICATIONS (ICUT 2009), 2009, :464-469
[38]   Blockchain Based Auditable Access Control for Distributed Business Processes [J].
Akhtar, Ahmed ;
Shafiq, Basit ;
Vaidya, Jaideep ;
Afzal, Ayesha ;
Shamail, Shafay ;
Rana, Omer .
2020 IEEE 40TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), 2020, :12-22
[39]   Behavioral and Human-Centric Access Control Model in XACML Reference Architecture: Design and Implementation of EHR Case Study [J].
Farhadighalati, Nastaran ;
Barata, Jose ;
Nikghadam-Hojjati, Sanaz ;
Marchetti, Eda .
TECHNOLOGICAL INNOVATION FOR HUMAN-CENTRIC SYSTEMS, DOCEIS 2024, 2024, 716 :192-203
[40]   Distributed Access Control: A Privacy-conscious Approach [J].
Cautis, Bogdan .
SACMAT'07: PROCEEDINGS OF THE 12TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2007, :61-70