2007
DOI: 10.1007/978-3-540-73538-0_20
|View full text |Cite
|
Sign up to set email alerts
|

XACML Policies for Exclusive Resource Usage

Abstract: Abstract. The extensible access control markup language (XACML) is the standard access control policy specification language of the World Wide Web. XACML does not provide exclusive accesses to globally resources. We do so by enhancing the policy execution framework with locks.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2007
2007
2013
2013

Publication Types

Select...
4
1
1

Relationship

2
4

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 9 publications
0
6
0
Order By: Relevance
“…He also provided the specifications of REA; in this way, XACML become more expressive access control language. [16] extended XACML syntax for supporting exclusive access to resources, and furthermore, add a lock manager to the policy enforcement module in order to enforce Chinese Wall constraints and DSoD. Bertino et al supported RBAC SoD in XACML in [17], but with OWL ontology, keeping user role activation state up-to-date in OWL ontology.…”
Section: Related Workmentioning
confidence: 98%
“…He also provided the specifications of REA; in this way, XACML become more expressive access control language. [16] extended XACML syntax for supporting exclusive access to resources, and furthermore, add a lock manager to the policy enforcement module in order to enforce Chinese Wall constraints and DSoD. Bertino et al supported RBAC SoD in XACML in [17], but with OWL ontology, keeping user role activation state up-to-date in OWL ontology.…”
Section: Related Workmentioning
confidence: 98%
“…A central lock manager, for example as suggested in [7], will then be required to ensure safe policy checks for concurrent authorisation requests, so that the SSD/DSD constraints ensure that less than a given number of sessions for a given role are active at the same time. This central lock manager needs to be extended to block updates of sessions and their roles by the REA and the Identity Manager during checking of SSD/DSD constraints to avoid race conditions that could violate the constraints.…”
Section: Spatial Separation Of Duties Constraints In Geoxacmlmentioning
confidence: 99%
“…In this aspect, our work provides a complete end to end security cover for workflows. Because we use XACML based policies for expressing security requirements, we can utilize earlier extensions like the lock manager enhancements by Dhankhar et al [11] to enforce RBAC-like authorization constraints.…”
Section: Related Workmentioning
confidence: 99%
“…Dhankhar et al have extended reference XACML implementation [26] with extensions to enforce exclusive use [11] and distributed policy evaluation [12] within a nested transaction tree framework. This paper extends their work to fully distribute evaluation and enforcement of XACML policies.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation