Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,397,756 papers from all fields of science
Search
Sign In
Create Free Account
XACML
Known as:
Policy Enforcement Point
, Policy Information Point
, Extensible Access Control Markup Language
Expand
XACML stands for "eXtensible Access Control Markup Language". The standard defines a declarative fine-grained, attribute-based access control policy…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
30 relations
ALFA (XACML)
Access control
Access control list
Application security
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
Invalidating Policies using Structural Information
F. Kammüller
,
Christian W. Probst
IEEE Security and Privacy Workshops
2013
Corpus ID: 890613
Insider threats are a major threat to many organisations. Even worse, insider attacks are usually hard to detect, especially if…
Expand
2013
2013
A Similarity Measure for Comparing XACML Policies
D. Lin
,
P. Rao
,
R. Ferrini
,
E. Bertino
,
Jorge Lobo
IEEE Transactions on Knowledge and Data…
2013
Corpus ID: 9662852
Assessing similarity of policies is crucial in a variety of scenarios, such as finding the cloud service providers which satisfy…
Expand
2011
2011
Secure and Sustainable Benchmarking in Clouds
F. Kerschbaum
Business & Information Systems Engineering
2011
Corpus ID: 16969827
Cloud computing entails a novel security threat: The cloud service provider is entrusted with the data of all its customers. This…
Expand
2011
2011
Controlled data sharing in E-health
I. Matteucci
,
P. Mori
,
M. Petrocchi
,
Luca Wiegand
Workshop on Socio-Technical Aspects in Security…
2011
Corpus ID: 11645127
In the last few years, the necessity of having documents in electronic format has been growing over and over. This phenomenon…
Expand
2010
2010
Systematic XACML Request Generation for Testing Purposes
A. Bertolino
,
F. Lonetti
,
E. Marchetti
EUROMICRO Conference on Software Engineering and…
2010
Corpus ID: 13030631
A widely adopted security mechanism is the specification of access control policies by means of the XACML language. In this paper…
Expand
2010
2010
ACPT: A Tool for Modeling and Verifying Access Control Policies
JeeHyun Hwang
,
Tao Xie
,
Vincent C. Hu
,
Mine Altunay
IEEE International Symposium on Policies for…
2010
Corpus ID: 8509560
Access control mechanisms are a widely adopted technology for information security. Since access decisions (i.e., permit or deny…
Expand
2008
2008
Automated xacml policy reconfiguration for evaluation optimisation
P. Miseldine
SESS '08
2008
Corpus ID: 16200800
We present a programmatic approach to the optimisation of XACML policies that specifies how a set of access control rules should…
Expand
2008
2008
Authorization recycling in RBAC systems
Qiang Wei
,
J. Crampton
,
K. Beznosov
,
M. Ripeanu
ACM Symposium on Access Control Models and…
2008
Corpus ID: 150515
As distributed applications increase in size and complexity, traditional authorization mechanisms based on a single policy…
Expand
Highly Cited
2004
Highly Cited
2004
A Web Service Architecture for Enforcing Access Control Policies
C. Ardagna
,
E. Damiani
,
S. Vimercati
,
P. Samarati
VODCA@FOSAD
2004
Corpus ID: 4047184
2001
2001
Use of COPS for Intserv operations over Diffserv: architectural issues, protocol design and test-bed implementation
R. Mameli
,
S. Salsano
ICC . IEEE International Conference on…
2001
Corpus ID: 4649237
This paper describes a solution for the Intserv operations over Diffserv network, based on the use of a bandwidth broker for the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE