XACML

Known as: Policy Enforcement Point, Policy Information Point, Extensible Access Control Markup Language 
XACML stands for "eXtensible Access Control Markup Language". The standard defines a declarative fine-grained, attribute-based access control policy… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Policy-based computing is taking an increasing role in providing real-time decisions and governing the systematic interaction… (More)
  • figure 1
  • table I
  • table II
  • figure 2
  • figure 3
Is this relevant?
2013
2013
Testing of security policies is a critical activity and mutation analysis is an effective approach for measuring the adequacy of… (More)
  • figure 1
  • table I
Is this relevant?
2012
2012
The amount of private information in the Internet is constantly increasing with the explosive growth of cloud computing and… (More)
  • figure 2
  • figure 1
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2011
2011
We study the international standard XACML 3.0 for describing security access control policy in a compositional way. Our main… (More)
  • table 1
  • table 2
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2009
Highly Cited
2009
XACML does not natively support RBAC and even the pecialized XACML profiles are not able to support many relevant constraints… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • table 2
Is this relevant?
Highly Cited
2008
Highly Cited
2008
XACML is the OASIS standard language specifically aimed at the specification of authorization policies. While XACML fits well… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2008
2008
eXtensible Access Control Markup Language (XACML), an OASIS standard, is the most widely used policy specifica- tion language for… (More)
  • figure 2
  • figure 3
  • figure 4
  • figure 7
  • figure 5
Is this relevant?
2005
2005
In this work we explore the use of process algebra in formalising and analysing access control policies. We do this by… (More)
Is this relevant?
2004
2004
This work proposes a XML-based framework for distributing and enforcing RSVP access control policies, for RSVP-aware application… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 3
  • figure 5
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Authorization systems today are increasingly complex. They span domains of administration, rely on many different authentication… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?