With concern of the current research results as well as the features of the demands for access control of the Web-based application system, this paper, first of all, raises a context constraint access control theory model on the level of standard reference model, from the perspective of flexibility, generality, clarity and easy to realize, and elaborates on the theory of this model and the architecture of access control system. Then it gives the description and modeling of the access control policy and defines the entities and relations in the model by using a XMLbased policy specification grammar called X-Grammar; finally, in the chapter of design and implementation of access control system, the paper gives the overall function description...
We propose a formal account of XACML, an OASIS standard adhering to the Policy Based Access Control ...
XML, a self-describing and semi-structured data format, is becoming a standard to represent and exc...
Abstract. Due to the growing interest in XML security, various access control schemes have been prop...
With concern of the current research results as well as the features of the demands for access contr...
With concern of the current research results as well as the features of the demands for access contr...
One of the most challenging problems in managing large, distributed, and heterogeneous networked sys...
We propose an access control scheme for developing authorization rules for XML documents, allowing f...
Modern day enterprises exhibit a growing trend toward adoption of enterprise computing services for ...
One of the most important features of XML-based Web services is that they can be easily accessed ove...
XML repositories are increasingly becoming popular to store data or as an interoperability layer for...
Modern day enterprises exhibit a growing trend toward adoption of enterprise computing services for ...
Web-based applications greatly increase information availability and ease of access, which is optima...
More and more information is distributed in XML format, both on corporate Intranets and on the globa...
Abstract. A practical mandatory access control (MAC) model for XML databases is presented in this pa...
Protecting data over the web is today a crucial need for many companies and organizations. This requ...
We propose a formal account of XACML, an OASIS standard adhering to the Policy Based Access Control ...
XML, a self-describing and semi-structured data format, is becoming a standard to represent and exc...
Abstract. Due to the growing interest in XML security, various access control schemes have been prop...
With concern of the current research results as well as the features of the demands for access contr...
With concern of the current research results as well as the features of the demands for access contr...
One of the most challenging problems in managing large, distributed, and heterogeneous networked sys...
We propose an access control scheme for developing authorization rules for XML documents, allowing f...
Modern day enterprises exhibit a growing trend toward adoption of enterprise computing services for ...
One of the most important features of XML-based Web services is that they can be easily accessed ove...
XML repositories are increasingly becoming popular to store data or as an interoperability layer for...
Modern day enterprises exhibit a growing trend toward adoption of enterprise computing services for ...
Web-based applications greatly increase information availability and ease of access, which is optima...
More and more information is distributed in XML format, both on corporate Intranets and on the globa...
Abstract. A practical mandatory access control (MAC) model for XML databases is presented in this pa...
Protecting data over the web is today a crucial need for many companies and organizations. This requ...
We propose a formal account of XACML, an OASIS standard adhering to the Policy Based Access Control ...
XML, a self-describing and semi-structured data format, is becoming a standard to represent and exc...
Abstract. Due to the growing interest in XML security, various access control schemes have been prop...