Abstract
The extensible access control markup language (XACML) is the standard access control policy specification language of the World Wide Web. XACML does not provide exclusive accesses to globally resources. We do so by enhancing the policy execution framework with locks.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Entrust: http://www.entrust.com/
Vordel: http://www.vordel.com/
Benatallah, B., Casasti, F., Toumani, F., Hamadi, R.: Conceptual modeling of web service conversations. Technical Report HPL-2003-60, HP Laboratories Palo Alto (March 2003)
Bhatti, R., Bertino, E., Ghafoor, A.: A trust-based context-aware access control model for web services. In: 2nd IEEE International Conference on Web Services (ICWS), July 2004, IEEE Computer Society Press, Los Alamitos (2004)
Bhatti, R., Joshi, J.B.D., Bertino, E., Ghafoor, A.: Access Control in Dynamic XML-Based Web Services using X-RBAC. In: First International Conference on Web Services (ICWS) (June 2003)
Bhatti, R., Joshi, J.B.D., Bertino, E., Ghafoor, A.: X-GTRBAC Admin: A Decentralized Administration Model for Enterprise-Wide Access Control. In: 9th ACM Symposium on Access Control Models and Technologies (SACMAT), June 2005, ACM Press, New York (2005)
Bhatti, R., Joshi, J.B.D., Bertino, E., Ghafoor, A.: X-GTRBAC:An XML-Based Policy Specification Framework and Architecture for Enterprise-Wide Access Control. ACM Transactions on Information and System Security (TISSEC)Â 8(2) (2005)
Clark, D., Wilson, D.: A comparison of commercial and military computer security policies. In: IEEE Symposium on Security and Privacy, Oakland, April 1987, pp. 184–194. IEEE Computer Society Press, Los Alamitos (1987)
Clark, D., Wilson, D.: Evolution of a model for computer integrity. In: Eleventh National Computer Security Conference, Baltimore (October 1988)
Dhankhar, V., Kaushik, S., Wijesekera, D.: XACML policies for exclusive resource usage. Technical Report ISE-TR-07-03, ISE Department, George Mason University, Fairfax (April 2007)
Farrell, S., Housley, R.: RFC 3281- an internet attribute certificate (April 2002)
Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed nist standard for role-based access control. ACM Transactions on Information and System Security 4(3), 224–274 (2001)
Haddad, S., Moreaux, P., Rampacek, S.: Client synthesis for Web Services by way of a timed semantics (ICEIS 2006). In: 8th International Conference on Enterprise Information Systems (May 2006)
Joshi, J.B., Bertino, E., Latif, U., Ghafoor, A.: A generalized temporal role-based access control model. IEEE Transaction on Knowledge and Data Engineering 17(1) (Janurary 2005)
Lepro, R.: Cardea: Dynamic access control in distributed systems. Technical Report NAS-03-020, NASA Advanced Supercomputing (NAS) Division, NASA Ames Research Center, Moffet Field, CA (November 2003)
OASIS: Business process execution language for web services (May 2003)
OASIS: Core and hierarchical role based access control (rbac) profile of xacml v2.0 (Feburary 2005), http://docs.oasis-open.org/xacml/2.0/access_control-xacml-2.0-rbac-profile1-specos.pdf
OASIS: Extensible access control markup language (Feburary 2005)
RFC 2753: A framework for policy-based admission control
Sandhu, R.S.: A lattice interpretation of the chinese wall policy. In: Proc. 15th NIST-NCSC National Computer Security Conference, pp. 329–339 (1992)
Tanenbaum, A.S., Steen, M.v.: Distributed Systems: Principles and Paradigms. Prentice-Hall, Englewood Cliffs (2002)
Tannenbaum, A.S.: Modern operating systems. Prentice-Hall Inc., Englewood Cliffs, NJ (1992)
Tartanoglu, F., Issarny, V., Levy, N., Romanovsky, A.: Dependability in the web service architecture. In: ICSE Workshop on Architecting Dependable Systems, Orlando, FL (May 2002)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 IFIP International Federation for Information Processing
About this paper
Cite this paper
Dhankhar, V., Kaushik, S., Wijesekera, D. (2007). XACML Policies for Exclusive Resource Usage. In: Barker, S., Ahn, GJ. (eds) Data and Applications Security XXI. DBSec 2007. Lecture Notes in Computer Science, vol 4602. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73538-0_20
Download citation
DOI: https://doi.org/10.1007/978-3-540-73538-0_20
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-73533-5
Online ISBN: 978-3-540-73538-0
eBook Packages: Computer ScienceComputer Science (R0)