A rigorous framework for specification, analysis and enforcement of access control policies

A Margheri, M Masi, R Pugliese… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Access control systems are widely used means for the protection of computing systems.
They are defined in terms of access control policies regulating the access to system …

[HTML][HTML] The logic of XACML

CDPK Ramli, HR Nielson, F Nielson - Science of Computer Programming, 2014 - Elsevier
We study the international standard XACML 3.0 for describing security access control
policies in a compositional way. Our main contributions are (i) to derive a logic that precisely …

Decision diagrams for XACML policy evaluation and management

C Ngo, Y Demchenko, C De Laat - Computers & Security, 2015 - Elsevier
One of the primary challenges to apply the XACML access control policy language in
applications is the performance problem of policy evaluation engines, particularly when they …

A policy model for access control using building information models

N Skandhakumar, J Reid, F Salim, E Dawson - International Journal of …, 2018 - Elsevier
Building information models have created a paradigm shift in how buildings are built and
managed by providing a dynamic repository for building data that is useful in many new …

Analysing UML-based software modelling languages

M Ozkaya - Journal of Aeronautics and Space Technologies, 2018 - jast.hho.msu.edu.tr
UML is considered as the top popular software modelling language among practitioners.
Expectedly, UML has been extended by many other languages, which tailor UML for …

A formal validation approach for XACML 3.0 access control policy

C Caserio, F Lonetti, E Marchetti - Sensors, 2022 - mdpi.com
Access control systems represent a security mechanism to regulate the access to system
resources, and XACML is the standard language for specifying, storing and deploying …

Secure data sharing and processing in heterogeneous clouds

B Suzic, A Reiter, F Reimair, D Venturi… - Procedia Computer …, 2015 - Elsevier
The extensive cloud adoption among the European Public Sector Players empowered them
to own and operate a range of cloud infrastructures. These deployments vary both in the size …

Establishment of attribute bitmaps for efficient XACML policy evaluation

F Deng, S Wang, L Zhang, X Wei, J Yu - Knowledge-Based Systems, 2018 - Elsevier
One of the primary challenges to apply the access control policy language XACML is the
performance problem of the policy decision point (PDP), particularly when the PDP …

Towards model-driven development of access control policies for web applications

M Busch, N Koch, M Masi, R Pugliese… - Proceedings of the …, 2012 - dl.acm.org
We introduce a UML-based notation for graphically modeling systems' security aspects in a
simple and intuitive way and a model-driven process that transforms graphical specifications …

An efficient policy evaluation engine for XACML policy management

F Deng, Z Yu, W Liu, X Luo, Y Fu, B Qiang, C Xu… - Information Sciences, 2021 - Elsevier
In recent years, XACML (eXtensible Access Control Markup Language) has been widely
used in the development of various applications, especially Web services. The evaluation …