Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,058,999 papers from all fields of science
Search
Sign In
Create Free Account
XACML
Known as:
Policy Enforcement Point
, Policy Information Point
, Extensible Access Control Markup Language
Expand
XACML stands for "eXtensible Access Control Markup Language". The standard defines a declarative fine-grained, attribute-based access control policy…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
30 relations
ALFA (XACML)
Access control
Access control list
Application security
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
Invalidating Policies using Structural Information
F. Kammüller
,
Christian W. Probst
IEEE Security and Privacy Workshops
2013
Corpus ID: 890613
Insider threats are a major threat to many organisations. Even worse, insider attacks are usually hard to detect, especially if…
Expand
2013
2013
A Similarity Measure for Comparing XACML Policies
D. Lin
,
P. Rao
,
R. Ferrini
,
E. Bertino
,
Jorge Lobo
IEEE Transactions on Knowledge and Data…
2013
Corpus ID: 9662852
Assessing similarity of policies is crucial in a variety of scenarios, such as finding the cloud service providers which satisfy…
Expand
2011
2011
Secure and Sustainable Benchmarking in Clouds
F. Kerschbaum
Business & Information Systems Engineering
2011
Corpus ID: 16969827
Cloud computing entails a novel security threat: The cloud service provider is entrusted with the data of all its customers. This…
Expand
2010
2010
ACPT: A Tool for Modeling and Verifying Access Control Policies
JeeHyun Hwang
,
Tao Xie
,
Vincent C. Hu
,
Mine Altunay
IEEE International Symposium on Policies for…
2010
Corpus ID: 8509560
Access control mechanisms are a widely adopted technology for information security. Since access decisions (i.e., permit or deny…
Expand
2008
2008
Authorization recycling in RBAC systems
Qiang Wei
,
J. Crampton
,
K. Beznosov
,
M. Ripeanu
ACM Symposium on Access Control Models and…
2008
Corpus ID: 150515
As distributed applications increase in size and complexity, traditional authorization mechanisms based on a single policy…
Expand
2008
2008
Automated xacml policy reconfiguration for evaluation optimisation
P. Miseldine
SESS '08
2008
Corpus ID: 16200800
We present a programmatic approach to the optimisation of XACML policies that specifies how a set of access control rules should…
Expand
Highly Cited
2008
Highly Cited
2008
A Trust and Context Based Access Control Model for Distributed Systems
Fujun Feng
,
Chuang Lin
,
Dongsheng Peng
,
Junshan Li
IEEE International Conference on High Performance…
2008
Corpus ID: 10280602
In order to overcome the limitations in traditional access control models such as identity-based access control and meet the…
Expand
Highly Cited
2004
Highly Cited
2004
A Web Service Architecture for Enforcing Access Control Policies
C. Ardagna
,
E. Damiani
,
S. Vimercati
,
P. Samarati
VODCA@FOSAD
2004
Corpus ID: 4047184
2003
2003
RB-GACA: A RBAC Based Grid Access Control Architecture
Weizhong Qiang
,
Hai Jin
,
Xuanhua Shi
,
Deqing Zou
,
H. Zhang
International Conference on Grid and Cooperative…
2003
Corpus ID: 5119580
Because the distribution of services and resources in wide-area networks are heterogeneous, dynamic, and multi-domain, security…
Expand
2001
2001
Use of COPS for Intserv operations over Diffserv: architectural issues, protocol design and test-bed implementation
R. Mameli
,
S. Salsano
ICC . IEEE International Conference on…
2001
Corpus ID: 4649237
This paper describes a solution for the Intserv operations over Diffserv network, based on the use of a bandwidth broker for the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE