An authorization model for temporal XML documents
Proceedings of the 2002 ACM symposium on Applied computing
E-P3P privacy policies and privacy authorization
Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society
Object Security Attributes: Enabling Application-Specific Access Control in Middleware
On the Move to Meaningful Internet Systems, 2002 - DOA/CoopIS/ODBASE 2002 Confederated International Conferences DOA, CoopIS and ODBASE 2002
Efficient comparison of enterprise privacy policies
Proceedings of the 2004 ACM symposium on Applied computing
KNOW Why your access was denied: regulating feedback for usable security
Proceedings of the 11th ACM conference on Computer and communications security
Deploying, updating, and managing tools for collecting software metrics
Proceedings of the 2004 workshop on Quantitative techniques for software agile process
Managing non-invasive measurement tools
Journal of Systems Architecture: the EUROMICRO Journal - Special issue: AGILE methodologies for software production
Regulating Exceptions in Healthcare Using Policy Spaces
Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security
Enforcing purpose of use via workflows
Proceedings of the 8th ACM workshop on Privacy in the electronic society
Cue: a framework for generating meaningful feedback in XACML
Proceedings of the 3rd ACM workshop on Assurable and usable security configuration
An algebra for enterprise privacy policies closed under composition and conjunction
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
Towards privacy-enhanced authorization policies and languages
DBSec'05 Proceedings of the 19th annual IFIP WG 11.3 working conference on Data and Applications Security
Privacy injector — automated privacy enforcement through aspects
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
Hi-index | 0.00 |
We present an approach for controlling access to datapublishers in the framework of Web-based informationservices. The paper presents a model for enforcingaccess control regulations, an XML core schema andnamespace for expressing such regulations, and illustratesthe architecture of Access Control Unit (ACU), anautonomous software component based on the proposedmodel. Besides "standard" authorizations, the ACUsupports authorizations based on user profiles and dynamicconditions whose outcome is determined by useractions such as the acceptance of a written agreementand/or payment.