The main goal of modern access control policy languages is to offer high-level languages, by using which security officers and application developers can express a large variety of access restrictions and isolate the security logic from the application logic. However, the current state-of-the-art language, XACML, suffers from some design flaws and lacks important features, such as those that characterize the RBAC model. Therefore, we propose an access control language that combines the benefits of both XACML and RBAC while avoiding their drawbacks
Many languages and algebras have been proposed in recent years for the specification of authorizatio...
Policy languages have become the most common way to protect the online resources from unauthorized a...
Most access control mechanisms focus on how to define the rights of users in a precise way to preven...
With the widespread use of web services, there is a need for adequate security and privacy support t...
We propose a formal account of XACML, an OASIS standard adhering to the Policy Based Access Control ...
We present the design and implementation of a Certified Core Policy Language (ACCPL) that can be use...
Some software applications are developed to collect, store, and manage users\u27 personal, medical, ...
One of the most challenging problems in managing large, distributed, and heterogeneous networked sys...
We introduce a UML-based notation for graphically modeling systems' security aspects in a simple and...
The extensible access control markup language (XACML) is the standard ac-cess control policy specifi...
We present a formal, tool-supported approach to the design and maintenance of access control policie...
The XML Role-Based Access Control (X-RBAC) specification language addresses multidomain environments...
Although the Internet of things (IoT) brought unlimited benefits, it also brought many security issu...
Current proposals for access control languages cannot specify policies required by specific applicat...
Traditional access control solutions, based on preliminary identification and authentication of the ...
Many languages and algebras have been proposed in recent years for the specification of authorizatio...
Policy languages have become the most common way to protect the online resources from unauthorized a...
Most access control mechanisms focus on how to define the rights of users in a precise way to preven...
With the widespread use of web services, there is a need for adequate security and privacy support t...
We propose a formal account of XACML, an OASIS standard adhering to the Policy Based Access Control ...
We present the design and implementation of a Certified Core Policy Language (ACCPL) that can be use...
Some software applications are developed to collect, store, and manage users\u27 personal, medical, ...
One of the most challenging problems in managing large, distributed, and heterogeneous networked sys...
We introduce a UML-based notation for graphically modeling systems' security aspects in a simple and...
The extensible access control markup language (XACML) is the standard ac-cess control policy specifi...
We present a formal, tool-supported approach to the design and maintenance of access control policie...
The XML Role-Based Access Control (X-RBAC) specification language addresses multidomain environments...
Although the Internet of things (IoT) brought unlimited benefits, it also brought many security issu...
Current proposals for access control languages cannot specify policies required by specific applicat...
Traditional access control solutions, based on preliminary identification and authentication of the ...
Many languages and algebras have been proposed in recent years for the specification of authorizatio...
Policy languages have become the most common way to protect the online resources from unauthorized a...
Most access control mechanisms focus on how to define the rights of users in a precise way to preven...