[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [Elist Home]
Subject: [xacml] More references for background
These may be useful. I tried to choose older documents, and have included the abstract where ACM Digital Library supplied it. Some of these are by our own people! -Anne A Logical Language for Expressing Authorizations S. Jajodia, P. Samarati, and V.S. Subrahmanian Proceedings of the 1997 IEEE Symposium on Security and Privacy. Oakland, CA, USA: IEEE Press, 1997. 31--42. A unified framework for enforcing multiple access control policies Sushil Jajodia , Pierangela Samarati , V. S. Subrahmanian , Eliza Bertino ACM SIGMOD Record , Proceedings of the 1997 ACM SIGMOD international conference on Management of data June 1997 Volume 26 Issue 2 Although several access control policies can be devised for controlling access to information, all existing authorization models, and the corresponding enforcement mechanisms, are based on a specific policy (usually the closed policy). As a consequence, although different policy choices are possible in theory, in practice only a specific policy can be actually applied within a given system. However, protection requirements within a system can vary dramatically, and no singl ... 98% The representation of policies as system objects Jonathan D. Moffett , Morris S. Sloman ACM SIGOIS Bulletin , Conference proceedings on Organizational computing systems October 1991 Volume 12 Issue 2-3 Concepts in configuration management systems Susan Dart Proceedings of the 3rd international workshop on Software configuration management May 1991 Access control for large collections H. M. Gladney ACM Transactions on Information Systems (TOIS) April 1997 Volume 15 Issue 2 Efforts to place vast information resources at the fingertips of each individual in large user populations must be balanced by commensurate attention to information protection. For distributed systems with less-structured tasks, more-diversified information, and a heterogeneous user set, the computing system must administer enterprise-chosen access control policies. One kind of resource is a digital library that emulates massive collections of paper and other physical media for clerical, en ... 15% Towards a framework for integrating multilevel secure models and temporal data models Niki Pissinou , Kia Makki , E. K. Park Proceedings of the third international conference on Information and knowledge management November 1994 Within many organizations the number of databases containing classified or otherwise sensitive data is increasing rapidly. Access to these databases must be restricted and controlled to limit the unauthorized disclosure, or malicious modification of data contained in them. However, the conventional models of authorization that have been designed for database systems supporting the hierarchical, network and relational models of data do not provide adequate mechanisms to support controlled ac ... 0%
[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [Elist Home]
Powered by eList eXpress LLC