Using microsoft office infopath to generate XACML policies

被引:0
|
作者
Sanchez, Manuel [1 ]
Lopez, Gabriel [1 ]
Gomez-Skarmeta, Antonio E. [1 ]
Canovas, Oscar [2 ]
机构
[1] Univ Murcia, Dept Informat Engn & Commun, E-30001 Murcia, Spain
[2] Univ Murcia, Dept Comp Engn, Murcia, Spain
来源
SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY | 2006年
关键词
policy editor; XACML; XSLT; access control;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Today, when organizations perform access control over their resources they are not only interested in the user's identity, but in other data such as user's attributes or contextual information. These requirements can be found, for example, in a network access control scenario where end users pay for a specific access level and depending on it, they can get different network quality of service. The network provider has to check, not only the user identity, but the user's attributes to make sure that he can access to the specified resource. These systems are based on the use of policy languages to define the authorization process. However, due to the increasing complexity of current systems, policies are becoming more and more complex to be managed by system administrators. Therefore, in this paper we present an user friendly approach to policy specification, based on the use of high level templates and common desktop applications. These templates are easily built from XML schemas, and once they have been filled, a XACML policy is automatically generated using a XML transformation.
引用
收藏
页码:379 / +
页数:2
相关论文
共 50 条
  • [41] Use of XACML Policies for a Network Access Control Service
    Lopez, Gabriel
    Canovas, Oscar
    Gomez-Skarmeta, Antonio F.
    APPLIED PUBLIC KEY INFRASTRUCTURE, 2005, 128 : 111 - 122
  • [42] An Algebra for Fine-Grained Integration of XACML Policies
    Rao, Prathima
    Lin, Dan
    Bertino, Elisa
    Li, Ninghui
    Lobo, Jorge
    SACMAT'09: PROCEEDINGS OF THE 14TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2009, : 63 - 72
  • [43] XACML-Based composition policies for ambient networks
    Kamienski, Carlos
    Fidalgo, Joseane
    Dantas, Ramide
    Sadok, Djamel
    Ohlman, Boerje
    EIGHTH IEEE INTERNATIONAL WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS - PROCEEDINGS, 2007, : 77 - +
  • [44] Conformance checking of access control policies specified in XACML
    Hu, Vincent C.
    Martin, Evan
    Hwang, JeeHyun
    Xie, Tao
    COMPSAC 2007: THE THIRTY-FIRST ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL II, PROCEEDINGS, 2007, : 275 - +
  • [45] Managing the lifecycle of XACML delegation policies in federated environments
    Sanchez, Manuel
    Canovas, Oscar
    Lopez, Gabriel
    Gomez-Skarmeta, Antonio F.
    PROCEEDINGS OF THE IFIP TC 11/ 23RD INTERNATIONAL INFORMATION SECURITY CONFERENCE, 2008, : 717 - +
  • [46] ANALYSIS AND VERIFICATION OF XACML POLICIES IN A MEDICAL CLOUD ENVIRONMENT
    Ayache, Meryeme
    Erradi, Mohammed
    Khoumsi, Ahmed
    Freisleben, Bernd
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2016, 17 (03): : 189 - 205
  • [47] Automated Microsoft Office Macro Malware Detection Using Machine Learning
    Bearden, Ruth
    Lo, Dan Chai-Tien
    2017 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2017, : 4448 - 4452
  • [48] XACML2mCRL2: Automatic transformation of XACML policies into mCRL2 specifications
    Arshad, Hamed
    Horne, Ross
    Johansen, Christian
    Owe, Olaf
    Willemse, Tim A. C.
    SCIENCE OF COMPUTER PROGRAMMING, 2024, 232
  • [49] Deriving XACML policies from business process models
    Wolter, Christian
    Schaad, Andreas
    Meinel, Christoph
    WEB INFORMATION SYSTEMS ENGINEERING - WISE 2007 WORKSHOPS, 2007, 4832 : 142 - +
  • [50] USING MICROSOFT OFFICE EXCEL® 2007 TO CONDUCT GENERALIZED MATCHING ANALYSES
    Reed, Derek D.
    JOURNAL OF APPLIED BEHAVIOR ANALYSIS, 2009, 42 (04) : 867 - 875