OASIS Mailing List ArchivesView the OASIS mailing list archive below
or browse/search using MarkMail.

 


Help: OASIS Mailing Lists Help | MarkMail Help

xacml message

[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [Elist Home]


Subject: [xacml] More references for background


These may be useful.  I tried to choose older documents, and have
included the abstract where ACM Digital Library supplied it.
Some of these are by our own people!  -Anne

      A Logical Language for Expressing Authorizations
      S. Jajodia, P. Samarati, and V.S. Subrahmanian
      Proceedings of the 1997 IEEE Symposium on Security and Privacy. Oakland, CA, USA: IEEE Press, 1997. 31--42. 

      A unified framework for enforcing multiple access control policies 
      Sushil Jajodia , Pierangela Samarati , V. S. Subrahmanian , Eliza Bertino 
      ACM SIGMOD Record , Proceedings of the 1997 ACM SIGMOD international conference on Management of data June 1997 
      Volume 26 Issue 2 
         Although several access control policies can be devised
         for controlling access to information, all existing
         authorization models, and the corresponding enforcement
         mechanisms, are based on a specific policy (usually the
         closed policy). As a consequence, although different
         policy choices are possible in theory, in practice only
         a specific policy can be actually applied within a given
         system. However, protection requirements within a system
         can vary dramatically, and no singl ... 98%
             
      The representation of policies as system objects 
      Jonathan D. Moffett , Morris S. Sloman 
      ACM SIGOIS Bulletin , Conference proceedings on Organizational computing systems October 1991 
      Volume 12 Issue 2-3 
    
      Concepts in configuration management systems 
      Susan Dart 
      Proceedings of the 3rd international workshop on Software configuration management May 1991 

    Access control for large collections 
    H. M. Gladney 
    ACM Transactions on Information Systems (TOIS) April 1997 
    Volume 15 Issue 2 
       Efforts to place vast information resources at the
       fingertips of each individual in large user populations
       must be balanced by commensurate attention to information
       protection. For distributed systems with less-structured
       tasks, more-diversified information, and a heterogeneous
       user set, the computing system must administer
       enterprise-chosen access control policies. One kind of
       resource is a digital library that emulates massive
       collections of paper and other physical media for
       clerical, en ... 15%
  
      Towards a framework for integrating multilevel secure models and temporal data models 
      Niki Pissinou , Kia Makki , E. K. Park 
      Proceedings of the third international conference on Information and knowledge management November 1994 
         Within many organizations the number of databases
       containing classified or otherwise sensitive data is
       increasing rapidly. Access to these databases must be
       restricted and controlled to limit the unauthorized
       disclosure, or malicious modification of data contained in
       them. However, the conventional models of authorization
       that have been designed for database systems supporting
       the hierarchical, network and relational models of data do
       not provide adequate mechanisms to support controlled ac
       ... 0%



[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [Elist Home]


Powered by eList eXpress LLC