[go: up one dir, main page]

Trabelsi et al., 2011 - Google Patents

Policy implementation in XACML

Trabelsi et al., 2011

Document ID
764828586531478590
Author
Trabelsi S
Njeh A
Publication year
Publication venue
Privacy and Identity Management for Life

External Links

Snippet

This chapter presents the implementation details of the PrimeLife policy engine (called PPL engine). This engine is primarily in charge of interpreting the policies and the preferences defined by the Data Controllers and the Data Subjects. Additionally, this engine is …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/74Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2105Dual mode as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2149Restricted operating environment

Similar Documents

Publication Publication Date Title
US10348774B2 (en) Method and system for managing security policies
Hu et al. Guide to attribute based access control (ABAC) definition and considerations
US10230732B2 (en) Authorization policy objects sharable across applications, persistence model, and application-level decision-combining algorithm
Wolter et al. Modelling security goals in business processes
CA2598100A1 (en) System and method for securing information accessible using a plurality of software applications
Mont et al. EnCoRe: dynamic consent, policy enforcement and accountable information sharing within and across organisations
Guth et al. Experiences with the enforcement of access rights extracted from ODRL-based digital contracts
Masood et al. Usage Control Model Specification in XACML Policy Language: XACML Policy Engine of UCON
Ardagna et al. Towards privacy-enhanced authorization policies and languages
Trabelsi et al. Policy implementation in XACML
Camilleri Data security in cloud-centric multi-tenant databases
Verlaenen et al. Towards simplified specification of policies in different domains
Belokosztolszki Role-based access control policy administration
Awad et al. User as a super admin: Giving the end-users full control to manage access to their data in social media networks
Shi Extended role-based access control model for enterprise systems and web services
Ruo-Fei et al. A united access control model for systems in collaborative commerce
Fatema Adding privacy protection to policy based authorisation systems
Scaglioso et al. Modern standard-based access control in network services: XACML in action
Alam et al. A model-driven framework for trusted computing based systems
Geetha et al. Role and attribute based access control model for web service composition in cloud environment
Malik et al. Security in web semantics: A revisit
Kaluvuri et al. A digital security certificate framework for services
Qian et al. A Security Contextualisation Framework for Digital Long-Term Preservation.
Pinsdorf et al. Privacy for Service Oriented Architectures
Bogaerts et al. Application-level authorization for multi-organizational software