XACML

Results: 149



#Item
1

Synthesising Verified Access Control Systems in XACML Nan Zhang School of Computer Science University of Birmingham Birmingham, UK, B15 2TT

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2009-02-25 10:33:24
    2

    Synthesising Verified Access Control Systems in XACML Nan Zhang School of Computer Science University of Birmingham Birmingham, UK, B15 2TT

    Add to Reading List

    Source URL: www.cs.bham.ac.uk.

    Language: English - Date: 2009-02-25 10:33:24
      3

      2 SAML 2.0 profile of XACML v2.0 3

      Add to Reading List

      Source URL: docs.oasis-open.org

      - Date: 2005-05-27 14:38:23
        4Computing / Data / Information technology / Computer access control / Data management / Access control / Records management / Metadata / Attribute / XACML / PERMIS / Authentication

        Draft NISTIR 8112, Attribute Metadata

        Add to Reading List

        Source URL: csrc.nist.gov

        Language: English - Date: 2016-08-01 15:13:29
        5Security / Computer security / Access control / Computer access control / Identity management / XACML / Authorization / Privacy / Information visualization / Internet privacy / Situation awareness

        Information Visualization for Rule-based Resource Access Control Jaime Montemayor, Andrew Freeman, John Gersh, Thomas Llanso, Dennis Patrone The Johns Hopkins University Applied Physics LaboratoryJohns Hopkins Roa

        Add to Reading List

        Source URL: cups.cs.cmu.edu

        Language: English - Date: 2006-06-02 15:04:21
        6Computer security / Security / Access control / Computer access control / XACML / PERMIS / Identity management / Role-based access control / Authorization / Model-driven security / PDP / Toolchain

        A Toolchain for Model-Based Design and Testing of Access Control Systems Said Daoudagh1 , Donia El Kateb2 , Francesca Lonetti1 , Eda Marchetti1 and Tejeddine Mouelhi3 1 Istituto di Scienza e Tecnologie dell’Informazio

        Add to Reading List

        Source URL: www.itrust.lu

        Language: English - Date: 2015-03-09 10:06:50
        7Security / Access control / Identity management / Computer security / Computer access control / Authorization / User / XACML

        Producing Hook Placements to Enforce Expected Access Control Policies No Author Given No Institute Given Abstract. Many security-sensitive programs manage resources on behalf of mutually distrusting clients. To control

        Add to Reading List

        Source URL: www.cse.psu.edu

        Language: English - Date: 2014-11-18 10:12:45
        8Computer access control / Computer security / Computing / Identity management / Federated identity / Metadata standards / Security Assertion Markup Language / SAML 2.0 / Shibboleth / XACML / OpenID / OAuth

        Milestone MJRA1.3: Design for the integration of an Attribute Management Tool

        Add to Reading List

        Source URL: aarc-project.eu

        Language: English - Date: 2016-07-21 05:59:16
        9Computing / Computer security / Security / Identity management / Computer access control / Cloud infrastructure / XACML / PaaSage / Security Assertion Markup Language / Cloud computing

        Security Enforcement for Multi-Cloud Platforms K. Kritikos (FORTH), T. Kirkham (STFC), B. Kryza (AGH) & P. Massonet (CETIC

        Add to Reading List

        Source URL: cf2015.holacloud.eu

        Language: English - Date: 2015-10-12 10:38:44
        10Health informatics / Computing / Computer security / XACML / Health information exchange / Security Assertion Markup Language / Electronic health record / Health

        IHE Work Item Proposal (Detailed) 1. Proposed Work Item: Patient Privacy Policy Query Proposal Editor: IHE Suisse Tony Schaller (Technical Project Manager)

        Add to Reading List

        Source URL: www.ihe-suisse.ch

        Language: English - Date: 2016-05-17 20:50:28
        UPDATE