Community Usage of the Online Conference Service: an Experience Report from three CS Conferences
I3E '02 Proceedings of the IFIP Conference on Towards The Knowledge Society: E-Commerce, E-Business, E-Government
FormulaBuilder: a tool for graph-based modelling and generation of formulae
Proceedings of the 28th international conference on Software engineering
A Web-Based Runtime-Reconfigurable Role Management Service
WWV '06 Proceedings of the 2nd Int'l. Workshop on Automated Specification and Verification of Web Systems
Model-driven development with the jABC
HVC'06 Proceedings of the 2nd international Haifa verification conference on Hardware and software, verification and testing
Hi-index | 0.00 |
Web-based access to sensitive and confidential data is realized today via different approaches, using a variety of methods to specify and combine access control policies. In an optic of change management and evolution, a structured and flexible model is needed to handle dynamicity, particularly when handling rights in systems with many users which hold different roles. Furthermore the validation of security constraints is an important key to warrant the reliability of control mechanisms. This paper compares the temporal logic-based approach for modeling access control used by the jABC framework with two popular XML-based description languages (XACML and WS-Policy), which are quasi-standards for policy expression in Web applications. Its usage is illustrated here on the example of the web-based Online Conference Service (OCS). The respective functionalities are described and examined in consideration of their ability to validate and enforce the needed policies.