Some software applications are developed to collect, store, and manage users\u27 personal, medical, or financial information. In the United States, such applications are required to preserve users\u27 privacy and to be compliant with the federal privacy laws and regulations. To formally guarantee compliance with federal regulations, it is necessary to express the privacy rules enforced by those regulations in a standard policy specification language. In this work we evaluate the eXtensible Access Control Model Language (XACML) as a formal specification language for privacy laws and regulations. Furthermore, we evaluate XACML features and attributes to extend it in order to enforce those privacy rules
Technological innovations like social networks, personal devices and cloud computing, allow users to...
Technological innovations like social networks, personal devices and cloud computing, allow users to...
Technological innovations like social networks, personal devices and cloud computing, allow users to...
In the medical sphere, personal and medical informa-tion is collected, stored, and transmitted for v...
The widespread diffusion of the Internet as the platform for accessing distributed services makes av...
The widespread diffusion of the Internet as the platform for accessing distributed services makes av...
The widespread diffusion of the Internet as the platform for accessing distributed services makes av...
In recent Web services research, there are increasing demands and discussions about negotiation tech...
With the widespread use of web services, there is a need for adequate security and privacy support t...
Most access control mechanisms focus on how to define the rights of users in a precise way to preven...
We propose a formal account of XACML, an OASIS standard adhering to the Policy Based Access Control ...
We propose a formal account of XACML, an OASIS standard adhering to the Policy Based Access Control ...
We propose a formal account of XACML, an OASIS standard adhering to the Policy Based Access Control ...
In this paper we describe extensions to the access control industry standards XACML and SAML to enab...
This chapter presents the results of the research on how the current standards for access control po...
Technological innovations like social networks, personal devices and cloud computing, allow users to...
Technological innovations like social networks, personal devices and cloud computing, allow users to...
Technological innovations like social networks, personal devices and cloud computing, allow users to...
In the medical sphere, personal and medical informa-tion is collected, stored, and transmitted for v...
The widespread diffusion of the Internet as the platform for accessing distributed services makes av...
The widespread diffusion of the Internet as the platform for accessing distributed services makes av...
The widespread diffusion of the Internet as the platform for accessing distributed services makes av...
In recent Web services research, there are increasing demands and discussions about negotiation tech...
With the widespread use of web services, there is a need for adequate security and privacy support t...
Most access control mechanisms focus on how to define the rights of users in a precise way to preven...
We propose a formal account of XACML, an OASIS standard adhering to the Policy Based Access Control ...
We propose a formal account of XACML, an OASIS standard adhering to the Policy Based Access Control ...
We propose a formal account of XACML, an OASIS standard adhering to the Policy Based Access Control ...
In this paper we describe extensions to the access control industry standards XACML and SAML to enab...
This chapter presents the results of the research on how the current standards for access control po...
Technological innovations like social networks, personal devices and cloud computing, allow users to...
Technological innovations like social networks, personal devices and cloud computing, allow users to...
Technological innovations like social networks, personal devices and cloud computing, allow users to...