Author's version of an article in the journal: Computer Standards and Interfaces. Also available from the publisher at: http://dx.doi.org/10.1016/j.csi.2011.10.007This paper describes a decision cache for the eXtensible Access Control Markup Language (XACML) that supports fine-grained authorisation and anonymisation of XML based messages and documents down to XML attribute and element level. The decision cache is implemented as an XACML obligation service, where a specification of the XML elements to be authorised and anonymised is sent to the Policy Enforcement Point (PEP) during initial authorisation. Further authorisation of individual XML elements according to the authorisation specification is then performed on all matching XML resourc...
Most access control mechanisms focus on how to define the rights of users in a precise way to preven...
With the widespread use of web services, there is a need for adequate security and privacy support t...
Nowadays many organisations share sensitive services through open network systems and this raises th...
Author's version of an article in the journal: Computer Standards and Interfaces. Also available fro...
Author's version of an article in the journal: Information Systems. Also available from the publishe...
The eXtensible Access Control Markup Language (XACML) is an extensible and flexible XML language for...
The eXtensible Access Control Markup Language (XACML) is an extensible and flexible XML language for...
The widespread diffusion of the Internet as the platform for accessing distributed services makes av...
The widespread diffusion of the Internet as the platform for accessing distributed services makes av...
One of the most challenging problems in managing large, distributed, and heterogeneous networked sys...
The widespread diffusion of the Internet as the platform for accessing distributed services makes av...
Abstract. Access control is a critical functionality in distributed sys-tems. Services and resources...
International audienceXML became the de facto standard for the data representation and exchange on t...
Some software applications are developed to collect, store, and manage users\u27 personal, medical, ...
The Extensible Markup Language (XML) has widely become the de facto method for the encoding of store...
Most access control mechanisms focus on how to define the rights of users in a precise way to preven...
With the widespread use of web services, there is a need for adequate security and privacy support t...
Nowadays many organisations share sensitive services through open network systems and this raises th...
Author's version of an article in the journal: Computer Standards and Interfaces. Also available fro...
Author's version of an article in the journal: Information Systems. Also available from the publishe...
The eXtensible Access Control Markup Language (XACML) is an extensible and flexible XML language for...
The eXtensible Access Control Markup Language (XACML) is an extensible and flexible XML language for...
The widespread diffusion of the Internet as the platform for accessing distributed services makes av...
The widespread diffusion of the Internet as the platform for accessing distributed services makes av...
One of the most challenging problems in managing large, distributed, and heterogeneous networked sys...
The widespread diffusion of the Internet as the platform for accessing distributed services makes av...
Abstract. Access control is a critical functionality in distributed sys-tems. Services and resources...
International audienceXML became the de facto standard for the data representation and exchange on t...
Some software applications are developed to collect, store, and manage users\u27 personal, medical, ...
The Extensible Markup Language (XML) has widely become the de facto method for the encoding of store...
Most access control mechanisms focus on how to define the rights of users in a precise way to preven...
With the widespread use of web services, there is a need for adequate security and privacy support t...
Nowadays many organisations share sensitive services through open network systems and this raises th...