Skip to main content

Advertisement

SpringerLink
Log in
Menu
Find a journal Publish with us Track your research
Search
Cart
Book cover

IFIP Annual Conference on Data and Applications Security and Privacy

DBSec 2007: Data and Applications Security XXI pp 275–290Cite as

  1. Home
  2. Data and Applications Security XXI
  3. Conference paper
XACML Policies for Exclusive Resource Usage

XACML Policies for Exclusive Resource Usage

  • Vijayant Dhankhar1,
  • Saket Kaushik1 &
  • Duminda Wijesekera1 
  • Conference paper
  • 1135 Accesses

  • 5 Citations

Part of the Lecture Notes in Computer Science book series (LNISA,volume 4602)

Abstract

The extensible access control markup language (XACML) is the standard access control policy specification language of the World Wide Web. XACML does not provide exclusive accesses to globally resources. We do so by enhancing the policy execution framework with locks.

Keywords

  • Access Control
  • Access Control Policy
  • Access Control Model
  • Access Request
  • Policy Decision Point

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Chapter PDF

Download to read the full chapter text

References

  1. Entrust: http://www.entrust.com/

  2. Vordel: http://www.vordel.com/

  3. Benatallah, B., Casasti, F., Toumani, F., Hamadi, R.: Conceptual modeling of web service conversations. Technical Report HPL-2003-60, HP Laboratories Palo Alto (March 2003)

    Google Scholar 

  4. Bhatti, R., Bertino, E., Ghafoor, A.: A trust-based context-aware access control model for web services. In: 2nd IEEE International Conference on Web Services (ICWS), July 2004, IEEE Computer Society Press, Los Alamitos (2004)

    Google Scholar 

  5. Bhatti, R., Joshi, J.B.D., Bertino, E., Ghafoor, A.: Access Control in Dynamic XML-Based Web Services using X-RBAC. In: First International Conference on Web Services (ICWS) (June 2003)

    Google Scholar 

  6. Bhatti, R., Joshi, J.B.D., Bertino, E., Ghafoor, A.: X-GTRBAC Admin: A Decentralized Administration Model for Enterprise-Wide Access Control. In: 9th ACM Symposium on Access Control Models and Technologies (SACMAT), June 2005, ACM Press, New York (2005)

    Google Scholar 

  7. Bhatti, R., Joshi, J.B.D., Bertino, E., Ghafoor, A.: X-GTRBAC:An XML-Based Policy Specification Framework and Architecture for Enterprise-Wide Access Control. ACM Transactions on Information and System Security (TISSEC) 8(2) (2005)

    Google Scholar 

  8. Clark, D., Wilson, D.: A comparison of commercial and military computer security policies. In: IEEE Symposium on Security and Privacy, Oakland, April 1987, pp. 184–194. IEEE Computer Society Press, Los Alamitos (1987)

    Google Scholar 

  9. Clark, D., Wilson, D.: Evolution of a model for computer integrity. In: Eleventh National Computer Security Conference, Baltimore (October 1988)

    Google Scholar 

  10. Dhankhar, V., Kaushik, S., Wijesekera, D.: XACML policies for exclusive resource usage. Technical Report ISE-TR-07-03, ISE Department, George Mason University, Fairfax (April 2007)

    Google Scholar 

  11. Farrell, S., Housley, R.: RFC 3281- an internet attribute certificate (April 2002)

    Google Scholar 

  12. Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed nist standard for role-based access control. ACM Transactions on Information and System Security 4(3), 224–274 (2001)

    CrossRef  Google Scholar 

  13. Haddad, S., Moreaux, P., Rampacek, S.: Client synthesis for Web Services by way of a timed semantics (ICEIS 2006). In: 8th International Conference on Enterprise Information Systems (May 2006)

    Google Scholar 

  14. Joshi, J.B., Bertino, E., Latif, U., Ghafoor, A.: A generalized temporal role-based access control model. IEEE Transaction on Knowledge and Data Engineering 17(1) (Janurary 2005)

    Google Scholar 

  15. Lepro, R.: Cardea: Dynamic access control in distributed systems. Technical Report NAS-03-020, NASA Advanced Supercomputing (NAS) Division, NASA Ames Research Center, Moffet Field, CA (November 2003)

    Google Scholar 

  16. OASIS: Business process execution language for web services (May 2003)

    Google Scholar 

  17. OASIS: Core and hierarchical role based access control (rbac) profile of xacml v2.0 (Feburary 2005), http://docs.oasis-open.org/xacml/2.0/access_control-xacml-2.0-rbac-profile1-specos.pdf

  18. OASIS: Extensible access control markup language (Feburary 2005)

    Google Scholar 

  19. RFC 2753: A framework for policy-based admission control

    Google Scholar 

  20. Sandhu, R.S.: A lattice interpretation of the chinese wall policy. In: Proc. 15th NIST-NCSC National Computer Security Conference, pp. 329–339 (1992)

    Google Scholar 

  21. Tanenbaum, A.S., Steen, M.v.: Distributed Systems: Principles and Paradigms. Prentice-Hall, Englewood Cliffs (2002)

    MATH  Google Scholar 

  22. Tannenbaum, A.S.: Modern operating systems. Prentice-Hall Inc., Englewood Cliffs, NJ (1992)

    Google Scholar 

  23. Tartanoglu, F., Issarny, V., Levy, N., Romanovsky, A.: Dependability in the web service architecture. In: ICSE Workshop on Architecting Dependable Systems, Orlando, FL (May 2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

  1. Department of Information & Software Engineering, George Mason University, Fairfax, VA 22030, U.S.A.

    Vijayant Dhankhar, Saket Kaushik & Duminda Wijesekera

Authors
  1. Vijayant Dhankhar
    View author publications

    You can also search for this author in PubMed Google Scholar

  2. Saket Kaushik
    View author publications

    You can also search for this author in PubMed Google Scholar

  3. Duminda Wijesekera
    View author publications

    You can also search for this author in PubMed Google Scholar

Editor information

Steve Barker Gail-Joon Ahn

Rights and permissions

Reprints and Permissions

Copyright information

© 2007 IFIP International Federation for Information Processing

About this paper

Cite this paper

Dhankhar, V., Kaushik, S., Wijesekera, D. (2007). XACML Policies for Exclusive Resource Usage. In: Barker, S., Ahn, GJ. (eds) Data and Applications Security XXI. DBSec 2007. Lecture Notes in Computer Science, vol 4602. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73538-0_20

Download citation

  • .RIS
  • .ENW
  • .BIB
  • DOI: https://doi.org/10.1007/978-3-540-73538-0_20

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-73533-5

  • Online ISBN: 978-3-540-73538-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Publish with us

Policies and ethics

search

Navigation

  • Find a journal
  • Publish with us
  • Track your research

Discover content

  • Journals A-Z
  • Books A-Z

Publish with us

  • Publish your research
  • Open access publishing

Products and services

  • Our products
  • Librarians
  • Societies
  • Partners and advertisers

Our imprints

  • Springer
  • Nature Portfolio
  • BMC
  • Palgrave Macmillan
  • Apress
  • Your US state privacy rights
  • Accessibility statement
  • Terms and conditions
  • Privacy policy
  • Help and support
  • Cancel contracts here

167.114.118.210

Not affiliated

Springer Nature

© 2023 Springer Nature