A trust-based context-aware access control model for web-services
R Bhatti, E Bertino, A Ghafoor - Distributed and Parallel Databases, 2005 - Springer
A key challenge in Web services security is the design of effective access control schemes
that can adequately meet the unique security challenges posed by the Web services …
that can adequately meet the unique security challenges posed by the Web services …
Access-control language for multidomain environments
JBD Joshi - IEEE Internet Computing, 2004 - ieeexplore.ieee.org
The XML role-based access control (X-RBAC) specification language addresses
multidomain environments' policy-specification needs. X-RBAC is based on an extension of …
multidomain environments' policy-specification needs. X-RBAC is based on an extension of …
X-GTRBAC: an XML-based policy specification framework and architecture for enterprise-wide access control
Modern day enterprises exhibit a growing trend toward adoption of enterprise computing
services for efficient resource utilization, scalability, and flexibility. These environments are …
services for efficient resource utilization, scalability, and flexibility. These environments are …
Communication across domains
S Isaacs, G Moore, D Thorpe… - US Patent 8,185,737, 2012 - Google Patents
2003/0002526 A1 1/2003 Dias et al. 2005/0256924 A1 11/2005 Chory et al. 2003/0014659
A1 1/2003 Zhu 2005/0259655 A1 11/2005 Cuervo et al. 2003/0023445 A1 1/2003 Trifon …
A1 1/2003 Zhu 2005/0259655 A1 11/2005 Cuervo et al. 2003/0023445 A1 1/2003 Trifon …
PolyOrBAC: A security framework for Critical Infrastructures
A Abou El Kalam, Y Deswarte, A Baïna… - International Journal of …, 2009 - Elsevier
Due to physical and logical vulnerabilities, a critical infrastructure (CI) can encounter failures
of various degrees of severity, and since there are many interdependencies between CIs …
of various degrees of severity, and since there are many interdependencies between CIs …
[PS][PS] Access Control in Dynamic XML-Based Web-Services with X-RBAC.
Policy specification for securing Web services is fast emerging as a key research area due to
rapid proliferation of Web services in modern day enterprise applications. Whilst the use of …
rapid proliferation of Web services in modern day enterprise applications. Whilst the use of …
System and/or method for authentication and/or authorization
D Grinstein - US Patent 8,166,404, 2012 - Google Patents
US8166404B2 - System and/or method for authentication and/or authorization - Google
Patents US8166404B2 - System and/or method for authentication and/or authorization …
Patents US8166404B2 - System and/or method for authentication and/or authorization …
Running internet applications with low rights
RA Franco, AP Ganjam, JG Bedworth… - US Patent …, 2011 - Google Patents
4,227,253 A 10, 1980 EhrSam et al. 4,984.272 A 1/1991 McIlroy et al. 5,210,874 A 5/1993
Karger 5,339,422 A 8, 1994 Brender et al. 5,377,188 A 12, 1994 Seki 5,428,529 A 6, 1995 …
Karger 5,339,422 A 8, 1994 Brender et al. 5,377,188 A 12, 1994 Seki 5,428,529 A 6, 1995 …
Identity-based distributed computing for device resources
D Alles, GM Moore - US Patent 9,886,309, 2018 - Google Patents
A system, method and related data structures for discovering and describing computing
resources available at various computing devices, and for exposing those resources as …
resources available at various computing devices, and for exposing those resources as …
System and/or method for class-based authorization
D Grinstein - US Patent 7,647,625, 2010 - Google Patents
US7647625B2 - System and/or method for class-based authorization - Google Patents
US7647625B2 - System and/or method for class-based authorization - Google Patents …
US7647625B2 - System and/or method for class-based authorization - Google Patents …