메뉴 건너뛰기




Volumn 2, Issue , 2005, Pages 1140-1144

A XACML-based access control model for web service

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL CRITERIA; ACCESS CONTROL MODEL; EXTENSIBLE ACCESS CONTROL MARKUP LANGUAGE; WEB SERVICE;

EID: 33646932243     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WCNM.2005.1544254     Document Type: Conference Paper
Times cited : (12)

References (20)
  • 1
    • 3543052334 scopus 로고    scopus 로고
    • First experiences using XACML for access control in distributed systems
    • Security 2003 (In Association with 10th ACM Conference on Computer and Communications Security)
    • Lorch. Markus. Provtor, Seth, Lepra and Sumit, "First experiences using XACML for access control in distributed systems", Proceedings of the ACM Workshop on XMI, Security 2003 (In Association with 10th ACM Conference on Computer and Communications Security), 2003, pp 25-37
    • (2003) Proceedings of the ACM Workshop on XMI , pp. 25-37
    • Lorch1    Markus2    Provtor3    Seth4    Lepra5    Sumit6
  • 3
    • 33646924234 scopus 로고    scopus 로고
    • Privacy policy profile of XACMI
    • Dec 6, in press
    • Tim Moses, "Privacy policy profile of XACMI ", OASIS TC Working Draft, Dec 6, 2004, in press
    • (2004) OASIS TC Working Draft
    • Moses, T.1
  • 7
    • 9944264597 scopus 로고    scopus 로고
    • A comparison of modeling strategies in defining XML-based access control languages
    • May
    • Ardagna, "A comparison of modeling strategies in defining XML-based access control languages", Computer Systems Science and Engineering, v 19, n 3, May, 2004, pp 1.41-1.49
    • (2004) Computer Systems Science and Engineering , vol.19 , Issue.3
    • Ardagna1
  • 9
    • 3543101229 scopus 로고    scopus 로고
    • XACML profile for Web-services
    • Sep 29, in press
    • Tim Moses. "XACML profile for Web-services", OASIS TC Working Draft. Sep 29, 2003, in press
    • (2003) OASIS TC Working Draft
    • Moses, T.1
  • 10
    • 84944734046 scopus 로고    scopus 로고
    • Security analysis of the SAML/ single sign-on browser/artifact profile
    • Gross, T. "Security analysis of the SAML/ single sign-on browser/artifact profile", Computer Security Applications Conference, 2003, pp:298 - 307
    • (2003) Computer Security Applications Conference , pp. 298-307
    • Gross, T.1
  • 11
    • 1142301938 scopus 로고    scopus 로고
    • Analysis of liberty single-sign-on with enabled clients
    • IEEE. Nov.-Dec.
    • Pfitzmann. B., Waidner, M., "Analysis of liberty single-sign-on with enabled clients". Internet Computing, IEEE. Volume 7, Issue 6, Nov.-Dec. 2003. pp: 38 - 44
    • (2003) Internet Computing , vol.7 , Issue.6 , pp. 38-44
    • Pfitzmann, B.1    Waidner, M.2
  • 13
    • 11344267683 scopus 로고    scopus 로고
    • An XML-based single sign-on scheme supporting mobile and home network service environments
    • Nov.
    • Jongil Jeong, Dongkyoo Shin. Dongil Shin, "An XML-based single sign-on scheme supporting mobile and home network service environments". Consumer Electronics, IEEE Transactions on Volume 50, Issue 4, Nov. 2004. pp: 1081-1086.
    • (2004) Consumer Electronics, IEEE Transactions on , vol.50 , Issue.4 , pp. 1081-1086
    • Jeong, J.1    Shin, D.2    Shin, D.3
  • 16
    • 14844342351 scopus 로고    scopus 로고
    • Identity management, Access specs are rolling along
    • January/February
    • Goth and Greg, "Identity management, Access specs are rolling along" Source: IEEE Internet Computing, v 9, n 1, January/February, 2005, pp: 9-11
    • (2005) Source: IEEE Internet Computing , vol.9 , Issue.1 , pp. 9-11
    • Goth1    Greg2
  • 17
    • 2642579954 scopus 로고    scopus 로고
    • Constrained delegation in XML-based access control and digital riglits management standards
    • Proceedings of the IASTED International Conference on Communication, Network, and Information Security
    • Navarro, Guillermo, Firozabadi, Babak Sadighi and Rissanen, "Constrained delegation in XML-based access control and digital riglits management standards". Proceedings of the IASTED International Conference on Communication, Network, and Information Security, Proceedings of the IASTED International Conference on Communication, Network, and Information Security. 2003, pp: 271-276
    • (2003) Proceedings of the IASTED International Conference on Communication, Network, and Information Security , pp. 271-276
    • Navarro1    Guillermo2    Firozabadi3    Sadighi, B.4    Rissanen5
  • 18
    • 12744268231 scopus 로고    scopus 로고
    • The role of an access control policy sandbox in a service oriented architecture
    • Proceedings of the International Conference on Internet Computing, IC'04
    • Tout, Hicham. Schoenficld and Brook, "The role of an access control policy sandbox in a service oriented architecture", Proceedings of the International Conference on Internet Computing, IC'04, v 1, Proceedings of the International Conference on Internet Computing, IC'04, 2004, pp: 434-439
    • (2004) Proceedings of the International Conference on Internet Computing, IC'04 , vol.1 , pp. 434-439
    • Tout1    Hicham2    Schoenficld3    Brook4
  • 19
    • 0141998521 scopus 로고    scopus 로고
    • Dynamically authorized role-based access control "or secure distributed computation
    • Humenu, Polar and Joncheng Kuo. "Dynamically Authorized Role-Based Access Control ("or Secure Distributed Computation"Source: Proceedings of the ACM Workshop on XML Security, 2003, pp: 97-103
    • (2003) Source: Proceedings of the ACM Workshop on XML Security , pp. 97-103
    • Humenu, P.1    Kuo, J.2
  • 20
    • 33746295685 scopus 로고    scopus 로고
    • A network access control approach based on the AAA architecture and authorization attributes
    • Proceedings. 19th IEEE International04-08 April
    • Lopez. G, Gomez. A, Marin. R and Canovas. O," A Network Access Control Approach Based on the AAA Architecture and Authorization Attributes", Parallel and Distributed Processing Symposium, 2005. Proceedings. 19th IEEE International04-08 April 2005, pp: 287a - 287a
    • (2005) Parallel and Distributed Processing Symposium, 2005
    • Lopez, G.1    Gomez, A.2    Marin, R.3    Canovas, O.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.