Role-Based Access Control With X.509 Attribute Certificates
IEEE Internet Computing
First experiences using XACML for access control in distributed systems
Proceedings of the 2003 ACM workshop on XML security
A Network Access Control Approach Based on the AAA Architecture and Authorization Attributes
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 17 - Volume 18
A heterogeneous network access service based on PERMIS and SAML
EuroPKI'05 Proceedings of the Second European conference on Public Key Infrastructure
A proposal for extending the eduroam infrastructure with authorization mechanisms
Computer Standards & Interfaces
Levels of Assurance and Reauthentication in Federated Environments
EuroPKI '08 Proceedings of the 5th European PKI workshop on Public Key Infrastructure: Theory and Practice
Performance analysis of a cross-layer SSO mechanism for a roaming infrastructure
Journal of Network and Computer Applications
Flexible secure inter-domain interoperability through attribute conversion
Information Sciences: an International Journal
Towards secure electronic workflows
EuroPKI 2006 Proceedings of the Third European conference on Public Key Infrastructure: theory and Practice
An access control system for multimedia content distribution
EuroPKI 2006 Proceedings of the Third European conference on Public Key Infrastructure: theory and Practice
Hi-index | 0.00 |
The interest in policy specification languages is increasing thanks to the proliferation of authorization solutions that need to define their resource access policies by means of them. These solutions define their own policy syntax, usually based on XML, which involves the definition of non-interoperable policies and non-heterogeneous environments. XACML has been defined with that purpose and is getting more and more acceptance for those type of environments as a valid alternative to proprietary policies. In this paper, we present the definition of the whole policies set needed in an authorization scenario, specifically, the NAS-SAML, which defines a network access control service based on SAML and the AAA architecture. We present the XACML documents representing those policies and the entities involved in the their management life cycle.