System and method for specifying security, privacy, and access control to information used by others

作者: Etienne Coulon , Francois Frederic Ozog

DOI:

关键词: CertificationService (systems architecture)WS-Federation Active Requestor ProfileWS-Federation Passive Requestor ProfileAccess controlComputer scienceElectronic documentComputer securitySettlorDigital signature

摘要: A grantor issues a trustable electronic document for the benefit of requestor. The requestor may be able to get benefits specified by through access controls located at service or information origin. request digitally signed is received. contains grantor. also certified reference, and control rules validated using reference

参考文章(17)
Norman Apperson, Brian C. Beckman, System and method for safety distributing executable objects ,(1996)
Abdelilah Essiari, William Johnston, Gary Hoo, Keith Jackson, Mary Thompson, Srilekha Mudumbai, Certificate-based access control for widely distributed resources usenix security symposium. pp. 17- 17 ,(1999)
Paul Ashley, Mark Vandenwauver, Joris Claessens, Using SESAME to Secure Web Based Applications on an Intranet communications and multimedia security. pp. 303- 318 ,(1999) , 10.1007/978-0-387-35568-9_21
Helmut Fieres, Roger Merkling, Keith Klemba, Application certification for an international cryptography framework ,(1997)
Jon H. Barber, Matthew W. Jackson, Richard M. Burkley, Douglas M. Young, Erwin L. Rehme, Ronald A. Woodward, System for controlling the number of concurrent copies of a program in a network based on the number of available licenses ,(1987)
Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati, Design and implementation of an access control processor for XML documents the web conference. ,vol. 33, pp. 59- 75 ,(2000) , 10.1016/S1389-1286(00)00053-0
B Zhan, Z Li, Y Yang, Z Hu, Research note: On the security of HY-key authentication scheme Computer Communications. ,vol. 22, pp. 739- 741 ,(1999) , 10.1016/S0140-3664(99)00032-8
John Linn, Magnus Nyström, Attribute certification: an enabling technology for delegation and role-based controls in distributed environments Proceedings of the fourth ACM workshop on Role-based access control. pp. 121- 130 ,(1999) , 10.1145/319171.319183