Role-Based Access Control Models
Computer
The description logic handbook: theory, implementation, and applications
The description logic handbook: theory, implementation, and applications
First experiences using XACML for access control in distributed systems
Proceedings of the 2003 ACM workshop on XML security
Synthesising verified access control systems in XACML
Proceedings of the 2004 ACM workshop on Formal methods in security engineering
Supporting RBAC with XACML+OWL
Proceedings of the 14th ACM symposium on Access control models and technologies
Hi-index | 0.00 |
As the quick development and application of technology such as Web Service, software or programs with special feature exist as public services in internet. They are queried and assembled under specific requirement. Being a passive control technique for data security, access control should have the ability to work synergistically across different organizations to prevent unauthorized access to special data, while these services or organizations share same role hierarchy and resource hierarchy, there may be conflicts on the overall security policies. XACML can be used to describe security policies by these public services, as it is a standardized expressive language for access control policies. Whereas Description Logics has the capability of representing knowledge and reasoning, a method that maps XACML policies to Description Logics Knowledge Base was proposed, and then the conflict detection problem is transformed into a problem of consistency in ABox.