Proceedings of the Eleventh ACM Symposium on Access Control Models and Technologies - SACMAT '06 2006
DOI: 10.1145/1133058.1133089
|View full text |Cite
|
Sign up to set email alerts
|

XACML policy integration algorithms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
29
0

Year Published

2010
2010
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 54 publications
(29 citation statements)
references
References 4 publications
0
29
0
Order By: Relevance
“…Relevant work has been done in the field of policy management such as policy integration and conflict resolution. Mazzoleni et al [9] proposed policy integration algorithms for XACML [14]. They believed that XACML had not been built to manage security for systems in which enterprises were dynamically constructed with the collaboration of multiple independent subjects.…”
Section: Related Workmentioning
confidence: 99%
“…Relevant work has been done in the field of policy management such as policy integration and conflict resolution. Mazzoleni et al [9] proposed policy integration algorithms for XACML [14]. They believed that XACML had not been built to manage security for systems in which enterprises were dynamically constructed with the collaboration of multiple independent subjects.…”
Section: Related Workmentioning
confidence: 99%
“…In this case, ${\cal C}_{{\cal P}_{{\cal S}{\cal A}} }$ indicates all semantic credential terms occurring in the composite ${\cal P}_{{\cal S}{\cal A}}$ . Policy composition has its inherent issues 31, such as preferences of integration and resolving policy conflicts, which a partner indicates them along with the registration of its semantic access policy.…”
Section: Interoperable Semantic Access Controlmentioning
confidence: 99%
“…During the coalition operation phase conflicting policies may occur especially when partners' services interact with each other, for example as part of a service composition process, and the resulting policy composition may require special reconciliation rules for proper policy enforcement. A recent work 31 proposes an extension to XACML 48 policy integration algorithms to handle policy reconciliation in dynamic and open environments.…”
Section: Related Workmentioning
confidence: 99%
“…In this work, we focus on discretionary access control, and the capability of deciding the access granularity by using SQL-based policy rules. Bertino et al [27] aimed at defining an extension of XACML access rules on resources located in largescale distributed systems. They focus on the problems of integrating conflicting policies in such a setting.…”
Section: Related Workmentioning
confidence: 99%