Home > CSC-OpenAccess Library > Manuscript Information
EXPLORE PUBLICATIONS BY COUNTRIES |
![]() |
| EUROPE | |
| MIDDLE EAST | |
| ASIA | |
| AFRICA | |
| ............................. | |
| United States of America | |
| United Kingdom | |
| Canada | |
| Australia | |
| Italy | |
| France | |
| Brazil | |
| Germany | |
| Malaysia | |
| Turkey | |
| China | |
| Taiwan | |
| Japan | |
| Saudi Arabia | |
| Jordan | |
| Egypt | |
| United Arab Emirates | |
| India | |
| Nigeria | |
Testing of Contextual Role-Based Access Control Model (C-RBAC)
Muhammad Nabeel Tahir
Pages - 62 - 75 | Revised - 20-02-2009 | Published - 15-03-2009
MORE INFORMATION
KEYWORDS
C-RBAC Testing, XACML and C-RBAC, Policy Specification Languages.
ABSTRACT
The OASIS eXtensible Access Control Markup Language (XACML) is a powerful and flexible language for expressing access control policies used to describe both, policy and access control decision request / response [2]. XACML is a declarative access control policy language implemented in XML and a processing model, describing how to interpret the policies. It is a replacement for IBM's XML access control language (XACL) which is no longer in development. XACML is a language primarily aimed at expressing privacy policies in a form such that computer systems can enforce them. The XACML has been widely deployed and there are several implementations of XACML in various programming languages available [3]. The XACML is designed to support both centralized and decentralized policy management.
| 1 | S. Gkarafli and A. A. Economides, “Comparing the Proof by Knowledge Authentication Techniques’, International Journal of Computer Science and Security (IJCSS), 4(2), pp. 237 – 255, 2010. |
| Anderson, A. (2005). A comparison of two privacy policy languages: EPAL and XACML. Sun Microsystems Labortory Technical Report #TR-2005-147, November 2005. Retrieved November 14, 2008, from http://research.sun.com/techrep/2005/abstract-147.html. | |
| IBM (2003). Enterprise privacy authorization language (EPAL). IBM Research Report June 2003. Retrieved November 14, 2008, from http://www.zurich.ibm.com/security/enterprise-privacy/epal. | |
| OASIS (2003). A brief introduction to XACML. Retrieved November 14, 2008, from http://www.oasis-open.org/committees/download.php/2713/Brief_Introduction_to_XACML.htm. | |
| Tahir, M. N. (2007). Contextual Role-Based Access Control. Ubiquitous Computing and Communication Journal, 2(3), 42-50. | |
Mr. Muhammad Nabeel Tahir
- Malaysia
m_nabeeltahir@yahoo.com
|
|
|
|
| View all special issues >> | |
|
|



