Trabelsi et al., 2011 - Google Patents
Policy implementation in XACMLTrabelsi et al., 2011
- Document ID
- 764828586531478590
- Author
- Trabelsi S
- Njeh A
- Publication year
- Publication venue
- Privacy and Identity Management for Life
External Links
Snippet
This chapter presents the implementation details of the PrimeLife policy engine (called PPL engine). This engine is primarily in charge of interpreting the policies and the preferences defined by the Data Controllers and the Data Subjects. Additionally, this engine is …
- 206010046306 Upper respiratory tract infection 0 description 15
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/74—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2105—Dual mode as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2149—Restricted operating environment
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US10348774B2 (en) | Method and system for managing security policies | |
| Hu et al. | Guide to attribute based access control (ABAC) definition and considerations | |
| US10230732B2 (en) | Authorization policy objects sharable across applications, persistence model, and application-level decision-combining algorithm | |
| Wolter et al. | Modelling security goals in business processes | |
| CA2598100A1 (en) | System and method for securing information accessible using a plurality of software applications | |
| Mont et al. | EnCoRe: dynamic consent, policy enforcement and accountable information sharing within and across organisations | |
| Guth et al. | Experiences with the enforcement of access rights extracted from ODRL-based digital contracts | |
| Masood et al. | Usage Control Model Specification in XACML Policy Language: XACML Policy Engine of UCON | |
| Ardagna et al. | Towards privacy-enhanced authorization policies and languages | |
| Trabelsi et al. | Policy implementation in XACML | |
| Camilleri | Data security in cloud-centric multi-tenant databases | |
| Verlaenen et al. | Towards simplified specification of policies in different domains | |
| Belokosztolszki | Role-based access control policy administration | |
| Awad et al. | User as a super admin: Giving the end-users full control to manage access to their data in social media networks | |
| Shi | Extended role-based access control model for enterprise systems and web services | |
| Ruo-Fei et al. | A united access control model for systems in collaborative commerce | |
| Fatema | Adding privacy protection to policy based authorisation systems | |
| Scaglioso et al. | Modern standard-based access control in network services: XACML in action | |
| Alam et al. | A model-driven framework for trusted computing based systems | |
| Geetha et al. | Role and attribute based access control model for web service composition in cloud environment | |
| Malik et al. | Security in web semantics: A revisit | |
| Kaluvuri et al. | A digital security certificate framework for services | |
| Qian et al. | A Security Contextualisation Framework for Digital Long-Term Preservation. | |
| Pinsdorf et al. | Privacy for Service Oriented Architectures | |
| Bogaerts et al. | Application-level authorization for multi-organizational software |