Paper Title:
Access Process of Data-Flow in Cross-Domain Usage Control Model Based on XACML
  Abstract

With the rapid development of information technology, more and more requesters need accessing the services in different access domains, which make the access process in cross-domain become more difficultly. The traditional access control models couldn’t solve the access process for their design limitations and diversity access policies. Usage control model (UCON) was proposed to strengthen the expression of access control model, but UCON is only a conceptual model. How to use the UCON in access process? It is worthwhile to further study. Extensible access control markup language (XACML) is an open standard XML-based language, which can be used to describe the security policy. In order to solve the access process in different access domains, based on XACML, access process of data-flow in cross-domain usage control model is proposed in the paper. Access process of data-flow cross different domains in XACML is introduced to solve the cross-domain problem. Finally, a small example is given to verify the effectiveness of access process.

  Info
Periodical
Advanced Materials Research (Volumes 143-144)
Edited by
H. Wang, B.J. Zhang, X.Z. Liu, D.Z. Luo, S.B. Zhong
Pages
1275-1279
DOI
10.4028/www.scientific.net/AMR.143-144.1275
Citation
C. Y. Dai, W. T. Gong, J. Liu, "Access Process of Data-Flow in Cross-Domain Usage Control Model Based on XACML", Advanced Materials Research, Vols. 143-144, pp. 1275-1279, 2011
Online since
October 2010
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Tao Peng, Ming Hua Jiang, Ming Hu
Abstract:A multi-policy access control model is proposed, with the model, access control based on policy regulation and XML based policy description...
970
Authors: Long Jun Huang, Cai Ying Zhou, Yuan Wang Wei, Li Ping Dai
Abstract:The scale of modern systems is increasingly large, the system safety requirements have become more sophisticated, a single access control...
1081
Authors: Hai Bo Shen, Yu Cheng
Chapter 5: Digital Manufacturing
Abstract:As computing technology becomes more pervasive and mobile services are deployed, applications will need flexible access control mechanisms....
498
Authors: Kun Huang, Yun Song Jian
Chapter 4: Mechatronics, Automation and Control
Abstract:The term usage control (UCON)[1] is a generalization of access control to cover obligations, conditions, continuity (ongoing...
1858
Authors: Kai Ze Yin, Hai Hang Wang
Chapter 6: Information Technologies, WEB and Networks Engineering, Information Security, Software Application and Development
Abstract:Cloud storage as a popular application in cloud services, are developing from single cloud service provider towards multiple cloud service...
2451