Using microsoft office infopath to generate XACML policies

被引:0
|
作者
Sanchez, Manuel [1 ]
Lopez, Gabriel [1 ]
Gomez-Skarmeta, Antonio E. [1 ]
Canovas, Oscar [2 ]
机构
[1] Univ Murcia, Dept Informat Engn & Commun, E-30001 Murcia, Spain
[2] Univ Murcia, Dept Comp Engn, Murcia, Spain
来源
SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY | 2006年
关键词
policy editor; XACML; XSLT; access control;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Today, when organizations perform access control over their resources they are not only interested in the user's identity, but in other data such as user's attributes or contextual information. These requirements can be found, for example, in a network access control scenario where end users pay for a specific access level and depending on it, they can get different network quality of service. The network provider has to check, not only the user identity, but the user's attributes to make sure that he can access to the specified resource. These systems are based on the use of policy languages to define the authorization process. However, due to the increasing complexity of current systems, policies are becoming more and more complex to be managed by system administrators. Therefore, in this paper we present an user friendly approach to policy specification, based on the use of high level templates and common desktop applications. These templates are easily built from XML schemas, and once they have been filled, a XACML policy is automatically generated using a XML transformation.
引用
收藏
页码:379 / +
页数:2
相关论文
共 50 条
  • [21] XACML policies for exclusive resource usage
    Dhankhar, Vijayant
    Kaushik, Saket
    Wijesekera, Duminda
    DATA AND APPLICATIONS SECURITY XXI, PROCEEDINGS, 2007, 4602 : 275 - +
  • [22] A Toolchain for Designing and Testing XACML Policies
    Bertolino, Antonia
    Busch, Marianne
    Daoudagh, Said
    Koch, Nora
    Lonetti, Francesca
    Marchetti, Eda
    2013 IEEE SIXTH INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION (ICST 2013), 2013, : 495 - +
  • [23] Enforcing RFID Data Visibility Restrictions Using XACML Security Policies
    Pardal, Miguel L.
    Harrison, Mark
    Sarma, Sanjay
    Marques, Jose Alves
    2012 IEEE INTERNATIONAL CONFERENCE ON RFID-TECHNOLOGIES AND APPLICATIONS (RFID-TA), 2012,
  • [24] Towards a Theory on Testing XACML Policies
    Xu, Dianxiang
    Shrestha, Roshan
    Shen, Ning
    Zhang, Yunpeng
    PROCEEDINGS OF THE 27TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, SACMAT 2022, 2022, : 103 - 114
  • [25] A Similarity Measure for Comparing XACML Policies
    Lin, Dan
    Rao, Prathima
    Ferrini, Rodolfo
    Bertino, Elisa
    Lobo, Jorge
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2013, 25 (09) : 1946 - 1959
  • [27] Approaches for Testing and Evaluation of XACML Policies
    Alsmadi, Izzat M.
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (04): : 101 - 111
  • [28] Special edition using Microsoft Office PowerPoint 2007
    Deaton, Mary
    TECHNICAL COMMUNICATION, 2008, 55 (02) : 219 - 222
  • [29] A rewriting system for the assessment of XACML policies relationship
    Mejri, Mohamed
    Yahyaoui, Hamdi
    Mourad, Azzam
    Chehab, Mohamad
    COMPUTERS & SECURITY, 2020, 97
  • [30] Automated Strong Mutation Testing of XACML Policies
    Xu, Dianxiang
    Shrestha, Roshan
    Shen, Ning
    SACMAT'20: PROCEEDINGS OF THE 25TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2020, : 105 - 116