2007
DOI: 10.1007/978-3-540-73538-0_11
|View full text |Cite
|
Sign up to set email alerts
|

A Privacy-Enhanced Attribute-Based Access Control System

Abstract: Service-oriented architectures (SOAs) are increasingly gaining popularity due to their considerable flexibility and scalability in open IT-environments. Along with their rising acceptance comes the need for well suited security components. In this respect, access control and privacy emerged to crucial factors. Targeting the demands of a SOA, many promising authorization models have been developed, most notably the attribute-based access control (ABAC) model. In this paper we take up concepts from the OASIS XAC… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
17
0
1

Year Published

2008
2008
2019
2019

Publication Types

Select...
3
3
2

Relationship

2
6

Authors

Journals

citations
Cited by 23 publications
(18 citation statements)
references
References 10 publications
0
17
0
1
Order By: Relevance
“…First ideas and the preliminary overall architecture of our security infrastructure for Access-eGov have already been presented in [4] and [5]. Similar approaches have as well been identified by [22], [23], [24].…”
Section: A Semantic Security Architecture For Web Servicesmentioning
confidence: 66%
See 1 more Smart Citation
“…First ideas and the preliminary overall architecture of our security infrastructure for Access-eGov have already been presented in [4] and [5]. Similar approaches have as well been identified by [22], [23], [24].…”
Section: A Semantic Security Architecture For Web Servicesmentioning
confidence: 66%
“…Our semantic security architecture for service-oriented systems based on the attribute-based access control paradigm [3] has already been described in [4], [5], [6] and has now successfully been implemented.…”
Section: Introductionmentioning
confidence: 99%
“…Discretionary Access Control (DAC) [5], Mandatory Access Control (MAC) [5], Role-Based Access Control (RBAC) [6,7], Attribute-Based Access Control (ABAC) [8], etc.…”
Section: Related Workmentioning
confidence: 99%
“…role-based access control (RBAC) [4,5], attribute-based access control [6], etc. Each approach has its own advantages, disadvantages and feasibility scope.…”
Section: Background and Related Workmentioning
confidence: 99%