Home > CSC-OpenAccess Library > Manuscript Information
EXPLORE PUBLICATIONS BY COUNTRIES |
![]() |
![]() |
EUROPE |
![]() |
MIDDLE EAST |
![]() |
ASIA |
![]() |
AFRICA |
............................. | |
![]() |
United States of America |
![]() |
United Kingdom |
![]() |
Canada |
![]() |
Australia |
![]() |
Italy |
![]() |
France |
![]() |
Brazil |
![]() |
Germany |
![]() |
Malaysia |
![]() |
Turkey |
![]() |
China |
![]() |
Taiwan |
![]() |
Japan |
![]() |
Saudi Arabia |
![]() |
Jordan |
![]() |
Egypt |
![]() |
United Arab Emirates |
![]() |
India |
![]() |
Nigeria |
Testing of Contextual Role-Based Access Control Model (C-RBAC)
Muhammad Nabeel Tahir
Pages - 62 - 75 | Revised - 20-02-2009 | Published - 15-03-2009
MORE INFORMATION
KEYWORDS
C-RBAC Testing, XACML and C-RBAC, Policy Specification Languages.
ABSTRACT
The OASIS eXtensible Access Control Markup Language (XACML) is a powerful and flexible language for expressing access control policies used to describe both, policy and access control decision request / response [2]. XACML is a declarative access control policy language implemented in XML and a processing model, describing how to interpret the policies. It is a replacement for IBM's XML access control language (XACL) which is no longer in development. XACML is a language primarily aimed at expressing privacy policies in a form such that computer systems can enforce them. The XACML has been widely deployed and there are several implementations of XACML in various programming languages available [3]. The XACML is designed to support both centralized and decentralized policy management.
1 | S. Gkarafli and A. A. Economides, “Comparing the Proof by Knowledge Authentication Techniques’, International Journal of Computer Science and Security (IJCSS), 4(2), pp. 237 – 255, 2010. |
Anderson, A. (2005). A comparison of two privacy policy languages: EPAL and XACML. Sun Microsystems Labortory Technical Report #TR-2005-147, November 2005. Retrieved November 14, 2008, from http://research.sun.com/techrep/2005/abstract-147.html. | |
IBM (2003). Enterprise privacy authorization language (EPAL). IBM Research Report June 2003. Retrieved November 14, 2008, from http://www.zurich.ibm.com/security/enterprise-privacy/epal. | |
OASIS (2003). A brief introduction to XACML. Retrieved November 14, 2008, from http://www.oasis-open.org/committees/download.php/2713/Brief_Introduction_to_XACML.htm. | |
Tahir, M. N. (2007). Contextual Role-Based Access Control. Ubiquitous Computing and Communication Journal, 2(3), 42-50. | |
Mr. Muhammad Nabeel Tahir
- Malaysia
m_nabeeltahir@yahoo.com
|
|
|
|
View all special issues >> | |
|
|